234 Results
000000000000IIE
Cover image for Cybercrime : investigating high-technology computer crime
by 
Moore, Robert, 1976-
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security -- Law and legislation -- United States.
Available: Copies:
Cover image for iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and
Available: Copies:
Cover image for Android forensics : investigation, analysis, and mobile security for Google Android
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
Android forensics : investigation, analysis, and mobile security for Google Android / Hoog, Andrew.
Available: Copies:
Cover image for Managing risk in information systems
by 
Gibson, Darril.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available: Copies:
Cover image for Architecture of network systems
by 
Serpanos, Dimitrios Nikolaou.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer network architectures.
Available: Copies:
Cover image for Succeeding with technology : computer system concepts for your life
by 
Baldauf, Ken.
Format: 
Books
Publication Date 
2011
Excerpt: 
Succeeding with technology : computer system concepts for your life / Baldauf, Ken.
Available: Copies:
Cover image for Security 2020 : reduce security risks this decade
by 
Howard, Doug.
Format: 
Books
Publication Date 
2011
Excerpt: 
Security 2020 : reduce security risks this decade / Howard, Doug.
Available: Copies:
Cover image for Wireshark network analysis : the official Wireshark certified network analyst study guide
by 
Chappell, Laura.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Cover image for Hacking exposed computer forensics : secrets & solutions
by 
Davis, Chris.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
Cover image for Secure and resilient software development
by 
Merkow, Mark S.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
Cover image for IT audit, control, and security
by 
Moeller, Robert R.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies: