156 Results Found Subscribe to search results
000000000000IIE
Print
49. 
Cover image for Cybercrime : investigating high-technology computer crime
by 
Moore, Robert, 1976-
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security -- Law and legislation -- United States.
Available: Copies:
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and
Available: Copies:
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
Android forensics : investigation, analysis, and mobile security for Google Android / Hoog, Andrew.
Available: Copies:
by 
Harper, Allen.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available: Copies:
by 
Serpanos, Dimitrios Nikolaou.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer network architectures.
Available: Copies:
55. 
Cover image for Succeeding with technology : computer system concepts for your life
by 
Baldauf, Ken.
Format: 
Books
Publication Date 
2011
Excerpt: 
Succeeding with technology : computer system concepts for your life / Baldauf, Ken.
Available: Copies:
by 
Chappell, Laura.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
57. 
Cover image for Internet fraud casebook : the World Wide Web of deceit
by 
Wells, Joseph T.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security -- Case studies.
Available: Copies:
by 
O'Brien, James A., 1936-
Format: 
Books
Publication Date 
2010
Excerpt: 
. Computer software ; 5. Data resource management ; Telecommunications and networks -- Module III. Business
Available: Copies:
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Shema, Mike.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available