Search Results for Computer crimes. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bcrimes.$0026ps$003d300? 2025-05-01T09:08:51Z Information and communications technology law ent://SD_ILS/0/SD_ILS:56675 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Van der Merwe, D. P.<br/>Format:&#160;Books<br/>Publication Date&#160;2021<br/> Cyber Security : A practitioner's guide ent://SD_ILS/0/SD_ILS:55778 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2017<br/> Information and communications technology law ent://SD_ILS/0/SD_ILS:146 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Van der Merwe, D. P.<br/>Format:&#160;Books<br/>Publication Date&#160;2016<br/> Computer forensics : cybercriminals, laws, and evidence ent://SD_ILS/0/SD_ILS:51984 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Maras, Marie-Helen, 1979- author.<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Criminalistics : an introduction to forensic science ent://SD_ILS/0/SD_ILS:56502 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Saferstein, Richard, 1941-<br/>Format:&#160;Books<br/>Publication Date&#160;2015<br/> Security awareness : applying practical security in your world ent://SD_ILS/0/SD_ILS:50225 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Ciampa, Mark.<br/>Format:&#160;Regular print<br/>Publication Date&#160;2014&#160;2013<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:50878 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Akhgar, Babak, editor of compilation.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Managing cyber attacks in international law, business, and relations : in search of cyber peace ent://SD_ILS/0/SD_ILS:53638 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Legal education : simulation in theory and practice ent://SD_ILS/0/SD_ILS:54833 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Strevens, Caroline, editor.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Criminal investigation ent://SD_ILS/0/SD_ILS:52162 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Brandl, Steven G. (Steven Gerard)<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Cyber power : Crime, conflict and security in cyberspace. ent://SD_ILS/0/SD_ILS:50041 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Ghernaouti-H&eacute;lie, Solange, 1958-....<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking exposed : mobile security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:50511 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Bergman, Neil.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Criminal &amp;amp; behavioral profiling ent://SD_ILS/0/SD_ILS:50797 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Bartol, Curt R., 1940-<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cybercrime and society ent://SD_ILS/0/SD_ILS:51722 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Yar, Majid.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:49861 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Amoroso, Edward.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Crimes, victims and witnesses : apartheid in Palestine ent://SD_ILS/0/SD_ILS:52158 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Svensson, Mats.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-b.html">http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-d.html">http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:50711 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Shema, Mike, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Forensic accounting and fraud examination ent://SD_ILS/0/SD_ILS:41833 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Kranacher, Mary-Jo, 1952-<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2011<br/> Cybercrime and espionage : an analysis of subversive multivector threats ent://SD_ILS/0/SD_ILS:45498 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Gragido, Will.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Cyber criminology : exploring Internet crimes and criminal behavior ent://SD_ILS/0/SD_ILS:46365 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Jaishankar, K.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Digital evidence and computer crime : forensic science, computers and the Internet ent://SD_ILS/0/SD_ILS:46197 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Casey, Eoghan.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Digital forensics with open source tools ent://SD_ILS/0/SD_ILS:50710 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Altheide, Cory.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Android forensics : investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:50712 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Hoog, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Frameworks for ICT policy : government, social and legal issues ent://SD_ILS/0/SD_ILS:42393 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Adomi, Esharenana E.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Xbox 360 forensics : a digital forensics guide to examining artifacts ent://SD_ILS/0/SD_ILS:46214 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Bolt, Steven.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:46219 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Moore, Robert, 1976-<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Internet fraud casebook : the World Wide Web of deceit ent://SD_ILS/0/SD_ILS:41839 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Wells, Joseph T.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:46362 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Timm, Carl.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Handbook of Internet crime ent://SD_ILS/0/SD_ILS:41134 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Jewkes, Yvonne, 1966-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Handbook of digital forensics and investigation ent://SD_ILS/0/SD_ILS:46213 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Casey, Eoghan.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Computer fraud casebook : the bytes that bite ent://SD_ILS/0/SD_ILS:40644 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Wells, Joseph T.<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Crime and deviance in cyberspace ent://SD_ILS/0/SD_ILS:46510 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Wall, David, 1956-<br/>Format:&#160;Books<br/>Publication Date&#160;2009<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:35367 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Nelson, Bill.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Encyclopedia of information ethics and security ent://SD_ILS/0/SD_ILS:35701 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Quigley, Marian.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0711/2007007277.html">http://www.loc.gov/catdir/toc/ecip0711/2007007277.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2008&#160;2007<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:46217 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Aquilina, James M.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Information and communications technology law ent://SD_ILS/0/SD_ILS:53882 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Van der Merwe, D. P.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Windows Vista security : securing Vista against malicious attacks ent://SD_ILS/0/SD_ILS:36285 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Grimes, Roger A.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0718/2007020135.html">http://www.loc.gov/catdir/toc/ecip0718/2007020135.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Computer forensics : an essential guide for accountants, lawyers, and managers ent://SD_ILS/0/SD_ILS:33569 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Sheetz, Michael.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Crime online ent://SD_ILS/0/SD_ILS:33552 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Jewkes, Yvonne, 1966-<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Computer forensics : evidence collection and management ent://SD_ILS/0/SD_ILS:44603 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Newman, Robert C.<br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors ent://SD_ILS/0/SD_ILS:42718 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Reyes, Anthony.<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2007<br/> Advances in digital forensics II : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 29-February 1, 2006. ent://SD_ILS/0/SD_ILS:33510 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;IFIP International Conference on Digital Forensics (2006 : Orlando, Fla.)<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0705/2006929911.html">http://www.loc.gov/catdir/toc/fy0705/2006929911.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Crime classification manual : a standard system for investigating and classifying violent crimes ent://SD_ILS/0/SD_ILS:33534 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Douglas, John E.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0615/2006016863.html">http://www.loc.gov/catdir/toc/ecip0615/2006016863.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Look both ways : help protect your family on the Internet ent://SD_ILS/0/SD_ILS:33840 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Criddle, Linda.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Police innovation : contrasting perspectives ent://SD_ILS/0/SD_ILS:35388 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Weisburd, David.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0665/2006297067-d.html">http://www.loc.gov/catdir/enhancements/fy0665/2006297067-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0665/2006297067-t.html">http://www.loc.gov/catdir/enhancements/fy0665/2006297067-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Cybercrime : digital cops in a networked environment ent://SD_ILS/0/SD_ILS:33487 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Balkin, J. M.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip071/2006030943.html">http://www.loc.gov/catdir/toc/ecip071/2006030943.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Handbook of transnational crime &amp;amp; justice ent://SD_ILS/0/SD_ILS:30963 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Reichel, Philip L.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0417/2004009278.html">http://www.loc.gov/catdir/toc/ecip0417/2004009278.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:36452 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Software forensics : collecting evidence from the scene of a digital crime ent://SD_ILS/0/SD_ILS:28510 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Cyber criminals on trial ent://SD_ILS/0/SD_ILS:29870 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Smith, Russell G.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/cam041/2004011308.html">http://www.loc.gov/catdir/toc/cam041/2004011308.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/cam041/2004011308.html">http://www.loc.gov/catdir/description/cam041/2004011308.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Digital evidence and computer crime : forensic science, computers, and the Internet ent://SD_ILS/0/SD_ILS:43514 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Casey, Eoghan.<br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Hacked, attacked &amp; abused : digital crime exposed ent://SD_ILS/0/SD_ILS:12880 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Lilley, Peter, 1957-<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Cyber crime investigator's field guide ent://SD_ILS/0/SD_ILS:27807 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Middleton, Bruce.<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Dot.cons : crime, deviance and identity on the internet ent://SD_ILS/0/SD_ILS:30471 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Jewkes, Yvonne, 1966-<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Hackers : crime and the digital sublime ent://SD_ILS/0/SD_ILS:33344 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Taylor, Paul A., 1967-<br/>Format:&#160;Books<br/>Publication Date&#160;1999<br/> Computer security ent://SD_ILS/0/SD_ILS:25229 2025-05-01T09:08:51Z 2025-05-01T09:08:51Z by&#160;Carroll, John Millar.<br/>Format:&#160;Books<br/>Publication Date&#160;1996<br/>