42 Results Found Subscribe to search results
000000000000IIE
Print
2. 
Cover image for Handbook of Internet crime
by 
Jewkes, Yvonne, 1966-
Format: 
Books
Publication Date 
2010
Excerpt: 
crime / Hackers, viruses and malicious software / Terror's web : how the internet is transforming
Available: Copies:
4. 
Cover image for What on Earth evolved? : 100 species that changed the world
by 
Lloyd, Christopher, 1968-
Format: 
Books
Publication Date 
2009
Excerpt: 
Before man. On viruses -- On simple cells -- On symbiosis -- On sea life -- On pioneers of the land
Available: Copies:
by 
Barton, Laurence, 1956-
Format: 
Books
Publication Date 
2008
Excerpt: 
-- Managing health crises : pandemics and viruses-- Stormy weather : Katrina, earthquakes, floods, and
Available: Copies:
6. 
Cover image for The politics of prevention : a global crisis in AIDS and education
by 
Boler, Tania.
Format: 
Books
Publication Date 
2008
Excerpt: 
HIV (Viruses) -- Prevention.
Available: Copies:
7. 
Cover image for Malware forensics : investigating and analyzing malicious code
by 
Aquilina, James M.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer viruses.
Available: Copies:
8. 
Cover image for Mongers in heaven : sexual tourism and HIV risk in Costa Rica and in the United States
by 
Schifter, Jacobo.
Format: 
Books
Publication Date 
2007
Excerpt: 
HIV (Viruses) -- Costa Rica.
Available: Copies:
by 
Carter, John B., 1944-.
Format: 
Books
Publication Date 
2007
Excerpt: 
Viruses.
Available: Copies:
10. 
Cover image for Microbiology and immunology
by 
Rosenthal, Ken S.
Format: 
Books
Publication Date 
2007
Excerpt: 
Viruses -- Examination Questions.
Available: Copies:
11. 
Cover image for Technology in action
by 
Evans, Alan.
Format: 
Books
Publication Date 
2006
Excerpt: 
hackers and viruses -- Protecting your computer and backing up your data -- Mobile computing: keeping your
Available: Copies:
12. 
Cover image for The unofficial guide to ethical hacking
by 
Fadia, Ankit, 1985-
Format: 
Books
Publication Date 
2006
Excerpt: 
programming -- Viruses torn apart -- How does a virus work? -- The Perl manual -- Exploits, scripts, and
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available