4 Results Found Subscribe to search results
0000IIE
Print
1. 
Cover image for Cybercrime and espionage : an analysis of subversive multivector threats
by 
Gragido, Will.
Format: 
Books
Publication Date 
2011
Excerpt: 
you distinct and timely insights. Presents never before published information: identification and
Available: Copies:
2. 
Cover image for Malware forensics : investigating and analyzing malicious code
by 
Aquilina, James M.
Format: 
Books
Publication Date 
2008
Excerpt: 
Identification and Profiling: Initial Analysis of a Suspect File on a Windows System -- File Identification and
Available: Copies:
3. 
Cover image for Dot.cons : crime, deviance and identity on the internet
by 
Jewkes, Yvonne, 1966-
Format: 
Books
Publication Date 
2002
Excerpt: 
Criminals -- Identification.
Available: Copies:
4. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Security -- Ch. 13. Emanations Security -- Ch. 14. Technical Security -- Ch. 15. Systems Identification
Available: Copies:
Limit Search Results
Access Level
Format
Material Type
Language
Library
Shelf Location
Publication Date
Item Available
Advanced Search Location