My Library

   
Limit search to available items
15 results found. Sorted by relevance | date | title .
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (1-15 of 15)
Very relevant 

Very relevant titles

 entries 1-15
1
Book
Book Cover

Researching Cybercrimes : Methodologies, Ethics, and Critical Approaches


Lavorgna, Anita
Basingstoke : Palgrave Macmillan, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  HV6773.R47 2021    Available
 Male Library  HV6773.R47 2021 c.2  Available
 Female Library  HV6773.R47 2021    Available
There are additional copies/volumes of this item
2
---
Book Cover

Encyclopedia of criminal activities and the Deep Web



Hershey : IGI Global Disseminator of Knowledge, 2020. 2020

Rating:

 

Copies

Location Call No. Status
 Male Library  HV6773 .E529 2020  vol.1    Available
 Male Library  HV6773 .E529 2020  vol.2    Available
 Male Library  HV6773 .E529 2020  vol.3    Available
There are additional copies/volumes of this item
3
Book
Book Cover

Information risk and security : preventing and investigating workplace computer crime


Wilding, Edward
London ; New York, United States : Routledge, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  HV6773.W553 2018    Available
 Male Library  HV6773.W553 2018 c.2  Available
 Female Library  HV6773.W553 2018    Available
4
Book
Book Cover

Cyber Criminology



2018

Rating:

 

Copies

Location Call No. Status
 Male Library  HV6773.C93 2018    Available
 Male Library  HV6773.C93 2018 c.2  Available
 Female Library  HV6773.C93 2018    Available
There are additional copies/volumes of this item
5
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S493 2016    Available
 Female Library  QA76.9.A25 S493 2016    Available
6
Book
Book Cover

The hacker playbook 2 : practical guide to penetration testing


Kim, Peter
North Charleston, South Carolina : Secure Planet, LLC, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 K56 2015    Available
 Female Library  QA76.9.A25 K56 2015    Available
7
Book
Book Cover

Handbook of research on digital crime, cyberspace security, and information assurance



Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6773 .H375 2015    Available
 Male Library  HV6773 .H375 2015    Available
8
Book
Book Cover

Cyber operations and the use of force in international law


Roscini, Marco
Oxford : Oxford University Press 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  K564.C6 R67 2014    Available
 Male Library  K564.C6 R67 2014    Available
9
Book
Book Cover

Technocrime, policing, and surveillance



London ; New York : Routledge, Taylor & Francis Group, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Male Library  HV6773 T4 2013    Available
 Female Library  HV6773 T4 2013    Available
10
Book
Book Cover

The basics of hacking and penetration testing : ethical hacking and penetration testing made easy


Engebretson, Patrick (Patrick Henry), 1974-
Amsterdam ; Boston : Syngress, an imprint of Elsevier, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 E5443 2013    Available
 Female Library  QA76.9.A25 E5443 2013 c.2  Available
11
Book
Book Cover

Cyber security culture : counteracting cyber threats through organizational learning and training


Trim, Peter R. J
London ; New York : Routledge, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HD30.2 .T75 2013    Available
 Male Library  HD30.2 .T75 2013    Available
12
Book
Book Cover

Computer forensics : cybercriminals, laws, and evidence


Maras, Marie-Helen, 1979-
Sudbury, Mass. : Jones & Bartlett Learning, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  KF8947.5 .M37 2012    Available
13
Book
Book Cover

Guide to computer forensics and investigations


Nelson, Bill
Boston, Mass. : Thomson Course Technology, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 N45 2006    Available
14
Book
Book Cover

Corporate fraud


Comer, Michael J
London : Routledge, 1997 1997

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6768 .C65 1997    Available
 Male Library  HV6768 .C65 1997    Available
15
Book
Book Cover

Guide to computer forensics and investigations : processing digital evidence


Nelson, Bill
Boston, MA : Cengage Learning, 2016  

Rating:

 

Copies

Location Call No. Status
 Female Library  HV8079.C65 N45 2016    Available
Add Marked to Bag Add All On Page Add Marked to My Lists
Resources
More Information