Log In
|
My Account
|
My Lists
|
Enable Accessibility Mode
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Library Search
Library Favorites Search
Rooms Content Search
DiXML Search
PDF Search
Other Marc Search
Asset Search
Electronic Resources Search
Rooms Restriction Values
All Fields
Author
Keyword in Author headings
Title
Subject
Keyword in Subject headings
ISBN
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
50 Results Found
1
2
3
4
5
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
00
IIE
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Dot.cons : crime, deviance and identity on the internet
by
Jewkes, Yvonne, 1966-
Format:
Books
Publication Date
2002
Excerpt:
Computer crimes.
Available:
Copies:
2.
Computer security
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
Computer crimes.
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
5
Limit Search Results
Narrowed by:
Included
Shelf Location: On-Shelf Student
Access Level
Include
Exclude
0
1
2
3
4
Author
Include
Exclude
Casey, Eoghan.
(4)
Jewkes, Yvonne, 1966-
(3)
Van der Merwe, D. P.
(3)
Wells, Joseph T.
(2)
Yar, Majid.
(2)
Adomi, Esharenana E.
(1)
Akhgar, Babak, editor of compilation.
(1)
Altheide, Cory.
(1)
Amoroso, Edward G.
(1)
Amoroso, Edward.
(1)
Aquilina, James M.
(1)
Arabnia, Hamid, editor of compilation.
(1)
Balkin, J. M.
(1)
Barrett, Diane.
(1)
Bartol, Anne M.
(1)
Bartol, Curt R., 1940-
(1)
Bergman, Neil.
(1)
Bolt, Steven.
(1)
Braga, Anthony Allan, 1969-
(1)
Brandl, Steven G. (Steven Gerard)
(1)
Brenner, Susan W.
(1)
Broom, Neil.
(1)
Carroll, John Millar.
(1)
Carvey, Harlan A.
(1)
Ciampa, Mark.
(1)
Criddle, Linda.
(1)
Dunne, Robert.
(1)
Ely, Adam.
(1)
Ghernaouti-Hélie, Solange, 1958-....
(1)
Grabosky, Peter N., 1945-
(1)
Gragido, Will.
(1)
Grimes, Richard H., editor.
(1)
Grimes, Roger A.
(1)
Hoog, Andrew.
(1)
IFIP International Conference on Digital Forensics (2006 : Orlando, Fla.)
(1)
Jaishankar, K.
(1)
Johansson, Jesper M.
(1)
Kranacher, Mary-Jo, 1952-
(1)
Liles, Samuel.
(1)
Malin, Cameron H.
(1)
Maras, Marie-Helen, 1979- author.
(1)
McCash, John.
(1)
Middleton, Bruce.
(1)
Moore, Robert, 1976-
(1)
Muir, Nancy.
(1)
Nelson, Bill.
(1)
Newman, Robert C.
(1)
Perez, Richard, 1969 October 17-
(1)
Phillips, Edward (Writer on Legal education), editor.
(1)
Pirc, John.
(1)
Reichel, Philip L.
(1)
Reyes, Anthony.
(1)
Riley, Richard, 1962 April 18-
(1)
Rogers, Russ.
(1)
Rouse, Jason.
(1)
Scambray, Joel.
(1)
Shackelford, Scott J. author.
(1)
Sheetz, Michael.
(1)
Shema, Mike, author.
(1)
Slade, Robert M.
(1)
Smith, Russell G.
(1)
Solomon, Michael (Michael G.), 1963-
(1)
Stanfield, Mike.
(1)
Strevens, Caroline, editor.
(1)
Sutton, David (Information security practitioner), author.
(1)
Svensson, Mats.
(1)
Timm, Carl.
(1)
Urbas, Gregor.
(1)
Wall, David, 1956-
(1)
Weisburd, David.
(1)
More
View All
Fewer
Collapse All
Format
Include
Exclude
Books
(47)
Electronic Resources
(2)
Regular print
(1)
Item Category 1
Include
Exclude
Non-Fiction Books
Prescribed Books
Recommended Books
Material Type
Include
Exclude
Audio-visual Material
Audio-visual equipment
General Books
Prescribed books
Language
Include
Exclude
English
(50)
Library
Include
Exclude
IIEMSA
RC Bloemfontein
RC Braamfontein
RC Durban
RC Nelson Mandela Bay
RC Polokwane
RC Pretoria CBD
VC Cape Town
VC Nelson Mandela Bay
VC Pietermaritzburg
VC Pretoria
VC Sandton
VC Westville
VEGA Bordeaux
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
1996-2004
2005-2007
2008-2010
2011-2014
2015-2021
Subject
Include
Exclude
Computer crimes.
(14)
Computer security.
(10)
Computer networks -- Security measures.
(9)
Computer crimes -- Investigation.
(8)
Computer crimes -- Prevention.
(7)
Evidence, Criminal.
(5)
Computer crimes -- Investigation -- United States.
(3)
Computer crimes -- South Africa.
(3)
Computers -- Law and legislation -- South Africa.
(3)
Data protection -- Law and legislation -- South Africa.
(3)
Forensic sciences.
(3)
Internet -- Law and legislation -- South Africa.
(3)
Telecommunication -- Law and legislation -- South Africa.
(3)
Computer crimes -- United States -- Prevention.
(2)
Criminal investigation.
(2)
Cyberspace -- Security measures.
(2)
Internet -- Social aspects.
(2)
Mobile computing -- Security measures.
(2)
Android (Electronic resource)
(1)
Application software -- Security measures.
(1)
Arab-Israeli conflict -- 1993- -- Personal narratives, Palestinian.
(1)
Arab-Israeli conflict -- 1993- -- Pictorial works.
(1)
Business intelligence.
(1)
COMPUTERS / Networking / Security.
(1)
Cell phone systems -- Security measures.
(1)
Community policing
(1)
Computer crimes -- Case studies.
(1)
Computer crimes -- Investigation -- Congresses.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer crimes -- Prevention -- International cooperation.
(1)
Computer files -- Law and legislation -- United States.
(1)
Computer fraud & hacking.
(1)
Computer security -- Case studies.
(1)
Computer security -- Law and legislation -- United States.
(1)
Computer security -- United States -- Evaluation.
(1)
Computer simulation.
(1)
Computer viruses.
(1)
Computers and families.
(1)
Confidential communications -- Protection.
(1)
Crime organisâe.
(1)
Crime prevention measures
(1)
Criminal behavior, Prediction of.
(1)
Criminal behavior.
(1)
Criminal justice, Administration of -- International cooperation.
(1)
Criminal profilers.
(1)
Criminalitâe internationale.
(1)
Criminals -- Identification.
(1)
Cyber intelligence (Computer security)
(1)
Cyberterrorism -- Prevention.
(1)
Cyberterrorism -- United States -- Prevention.
(1)
Cyberterrorism.
(1)
Data protection.
(1)
Data recovery (Computer science)
(1)
Data security.
(1)
Deviant behavior.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronic discovery (Law) -- Congresses.
(1)
Electronic evidence -- United States.
(1)
Electronic surveillance.
(1)
Electronics in criminal investigation -- Congresses.
(1)
Espionage.
(1)
Evidence, Criminal -- Congresses.
(1)
Evidence, Criminal -- United States.
(1)
Evidence, Expert -- United States.
(1)
Evidence-based crime prevention
(1)
Forensic accounting.
(1)
Forensic sciences -- Data processing -- Congresses.
(1)
Fraud -- Prevention.
(1)
Fraud investigation.
(1)
Georganiseerde misdaad.
(1)
Google.
(1)
Hackere
(1)
Hackers.
(1)
Information technology -- Government policy -- Cross-cultural studies.
(1)
Information technology -- Security measures -- Cross-cultural studies.
(1)
Information technology -- Security measures.
(1)
Information warfare (International law)
(1)
Internationaal strafrecht.
(1)
Internet -- Law and legislation -- United States.
(1)
Internet -- Safety measures.
(1)
Internet and children.
(1)
Internet fraud -- Case studies.
(1)
Internet.
(1)
Israeli West Bank Barrier.
(1)
Justice pâenale -- Administration -- Coopâeration internationale.
(1)
Law -- Study and teaching.
(1)
Malware (Computer software) -- Prevention.
(1)
Microsoft Windows (Computer file)
(1)
Mobile communication systems -- Security measures.
(1)
Mobile computing.
(1)
National security -- United States.
(1)
Online social networks -- Security measures.
(1)
Open source software.
(1)
Organized crime.
(1)
Palestinian Arabs -- Israel.
(1)
Police
(1)
Police -- United States.
(1)
Police computers
(1)
Private police
(1)
Problem oriented policing
(1)
Security systems.
(1)
Simulation methods.
(1)
Smartphones -- Security measures.
(1)
Threats -- Safety measures.
(1)
Transnational crime.
(1)
Web 2.0 -- Security measures.
(1)
Web site development -- Security measures.
(1)
Xbox 360 (Video game console)
(1)
More
View All
Fewer
Collapse All
Item Available
Include
Exclude
0
Advanced Search Location
Include
Exclude
1:RCBMFO
1:RCCTO
1:RCPTO
Cataloguing
IIE Sandton
IIEMSA
RC Bloemfontein
RC Braamfontein
RC Cape Town
RC Durban
RC Nelson Mandela Bay
RC Pietermaritzburg
RC Polokwane
RC Pretoria CBD
VC Cape Town
VC Durban North
VC Nelson Mandela Bay
VC Pietermaritzburg
VC Pretoria
VC Sandton
VC Waterfall
VC Westville
VEGA Bordeaux
VEGA Cape Town
VEGA Durban
VEGA Pretoria
More
View All
Fewer
Collapse All
true
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}