Search Results for Computer crimes.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bcrimes.$0026ps$003d300?2025-05-01T09:08:51ZInformation and communications technology lawent://SD_ILS/0/SD_ILS:566752025-05-01T09:08:51Z2025-05-01T09:08:51Zby Van der Merwe, D. P.<br/>Format: Books<br/>Publication Date 2021<br/>Cyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-05-01T09:08:51Z2025-05-01T09:08:51Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Information and communications technology lawent://SD_ILS/0/SD_ILS:1462025-05-01T09:08:51Z2025-05-01T09:08:51Zby Van der Merwe, D. P.<br/>Format: Books<br/>Publication Date 2016<br/>Computer forensics : cybercriminals, laws, and evidenceent://SD_ILS/0/SD_ILS:519842025-05-01T09:08:51Z2025-05-01T09:08:51Zby Maras, Marie-Helen, 1979- author.<br/>Format: Books<br/>Publication Date 2015<br/>Criminalistics : an introduction to forensic scienceent://SD_ILS/0/SD_ILS:565022025-05-01T09:08:51Z2025-05-01T09:08:51Zby Saferstein, Richard, 1941-<br/>Format: Books<br/>Publication Date 2015<br/>Security awareness : applying practical security in your worldent://SD_ILS/0/SD_ILS:502252025-05-01T09:08:51Z2025-05-01T09:08:51Zby Ciampa, Mark.<br/>Format: Regular print<br/>Publication Date 2014 2013<br/>Emerging trends in ICT securityent://SD_ILS/0/SD_ILS:508782025-05-01T09:08:51Z2025-05-01T09:08:51Zby Akhgar, Babak, editor of compilation.<br/>Format: Books<br/>Publication Date 2014<br/>Managing cyber attacks in international law, business, and relations : in search of cyber peaceent://SD_ILS/0/SD_ILS:536382025-05-01T09:08:51Z2025-05-01T09:08:51Zby Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format: Books<br/>Publication Date 2014<br/>Legal education : simulation in theory and practiceent://SD_ILS/0/SD_ILS:548332025-05-01T09:08:51Z2025-05-01T09:08:51Zby Strevens, Caroline, editor.<br/>Format: Books<br/>Publication Date 2014<br/>Criminal investigationent://SD_ILS/0/SD_ILS:521622025-05-01T09:08:51Z2025-05-01T09:08:51Zby Brandl, Steven G. (Steven Gerard)<br/>Format: Books<br/>Publication Date 2014<br/>Cyber power : Crime, conflict and security in cyberspace.ent://SD_ILS/0/SD_ILS:500412025-05-01T09:08:51Z2025-05-01T09:08:51Zby Ghernaouti-Hélie, Solange, 1958-....<br/>Format: Books<br/>Publication Date 2013<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-05-01T09:08:51Z2025-05-01T09:08:51Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Criminal &amp; behavioral profilingent://SD_ILS/0/SD_ILS:507972025-05-01T09:08:51Z2025-05-01T09:08:51Zby Bartol, Curt R., 1940-<br/>Format: Books<br/>Publication Date 2013<br/>Cybercrime and societyent://SD_ILS/0/SD_ILS:517222025-05-01T09:08:51Z2025-05-01T09:08:51Zby Yar, Majid.<br/>Format: Books<br/>Publication Date 2013<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:498612025-05-01T09:08:51Z2025-05-01T09:08:51Zby Amoroso, Edward.<br/>Format: Books<br/>Publication Date 2013<br/>Crimes, victims and witnesses : apartheid in Palestineent://SD_ILS/0/SD_ILS:521582025-05-01T09:08:51Z2025-05-01T09:08:51Zby Svensson, Mats.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-b.html">http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-d.html">http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-d.html</a><br/>Format: Books<br/>Publication Date 2013<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:507112025-05-01T09:08:51Z2025-05-01T09:08:51Zby Shema, Mike, author.<br/>Format: Books<br/>Publication Date 2012<br/>Forensic accounting and fraud examinationent://SD_ILS/0/SD_ILS:418332025-05-01T09:08:51Z2025-05-01T09:08:51Zby Kranacher, Mary-Jo, 1952-<br/>Format: Electronic Resources<br/>Publication Date 2011<br/>Cybercrime and espionage : an analysis of subversive multivector threatsent://SD_ILS/0/SD_ILS:454982025-05-01T09:08:51Z2025-05-01T09:08:51Zby Gragido, Will.<br/>Format: Books<br/>Publication Date 2011<br/>Cyber criminology : exploring Internet crimes and criminal behaviorent://SD_ILS/0/SD_ILS:463652025-05-01T09:08:51Z2025-05-01T09:08:51Zby Jaishankar, K.<br/>Format: Books<br/>Publication Date 2011<br/>Digital evidence and computer crime : forensic science, computers and the Internetent://SD_ILS/0/SD_ILS:461972025-05-01T09:08:51Z2025-05-01T09:08:51Zby Casey, Eoghan.<br/>Format: Books<br/>Publication Date 2011<br/>Digital forensics with open source toolsent://SD_ILS/0/SD_ILS:507102025-05-01T09:08:51Z2025-05-01T09:08:51Zby Altheide, Cory.<br/>Format: Books<br/>Publication Date 2011<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:507122025-05-01T09:08:51Z2025-05-01T09:08:51Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Frameworks for ICT policy : government, social and legal issuesent://SD_ILS/0/SD_ILS:423932025-05-01T09:08:51Z2025-05-01T09:08:51Zby Adomi, Esharenana E.<br/>Format: Books<br/>Publication Date 2011<br/>Xbox 360 forensics : a digital forensics guide to examining artifactsent://SD_ILS/0/SD_ILS:462142025-05-01T09:08:51Z2025-05-01T09:08:51Zby Bolt, Steven.<br/>Format: Books<br/>Publication Date 2011<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:462192025-05-01T09:08:51Z2025-05-01T09:08:51Zby Moore, Robert, 1976-<br/>Format: Books<br/>Publication Date 2011<br/>Internet fraud casebook : the World Wide Web of deceitent://SD_ILS/0/SD_ILS:418392025-05-01T09:08:51Z2025-05-01T09:08:51Zby Wells, Joseph T.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html</a><br/>Format: Books<br/>Publication Date 2010<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:463622025-05-01T09:08:51Z2025-05-01T09:08:51Zby Timm, Carl.<br/>Format: Books<br/>Publication Date 2010<br/>Handbook of Internet crimeent://SD_ILS/0/SD_ILS:411342025-05-01T09:08:51Z2025-05-01T09:08:51Zby Jewkes, Yvonne, 1966-<br/>Format: Books<br/>Publication Date 2010<br/>Handbook of digital forensics and investigationent://SD_ILS/0/SD_ILS:462132025-05-01T09:08:51Z2025-05-01T09:08:51Zby Casey, Eoghan.<br/>Format: Books<br/>Publication Date 2010<br/>Computer fraud casebook : the bytes that biteent://SD_ILS/0/SD_ILS:406442025-05-01T09:08:51Z2025-05-01T09:08:51Zby Wells, Joseph T.<br/>Format: Books<br/>Publication Date 2009<br/>Crime and deviance in cyberspaceent://SD_ILS/0/SD_ILS:465102025-05-01T09:08:51Z2025-05-01T09:08:51Zby Wall, David, 1956-<br/>Format: Books<br/>Publication Date 2009<br/>Guide to computer forensics and investigationsent://SD_ILS/0/SD_ILS:353672025-05-01T09:08:51Z2025-05-01T09:08:51Zby Nelson, Bill.<br/>Format: Books<br/>Publication Date 2008<br/>Encyclopedia of information ethics and securityent://SD_ILS/0/SD_ILS:357012025-05-01T09:08:51Z2025-05-01T09:08:51Zby Quigley, Marian.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0711/2007007277.html">http://www.loc.gov/catdir/toc/ecip0711/2007007277.html</a><br/>Format: Books<br/>Publication Date 2008 2007<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:462172025-05-01T09:08:51Z2025-05-01T09:08:51Zby Aquilina, James M.<br/>Format: Books<br/>Publication Date 2008<br/>Information and communications technology lawent://SD_ILS/0/SD_ILS:538822025-05-01T09:08:51Z2025-05-01T09:08:51Zby Van der Merwe, D. P.<br/>Format: Books<br/>Publication Date 2008<br/>Windows Vista security : securing Vista against malicious attacksent://SD_ILS/0/SD_ILS:362852025-05-01T09:08:51Z2025-05-01T09:08:51Zby Grimes, Roger A.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0718/2007020135.html">http://www.loc.gov/catdir/toc/ecip0718/2007020135.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Computer forensics : an essential guide for accountants, lawyers, and managersent://SD_ILS/0/SD_ILS:335692025-05-01T09:08:51Z2025-05-01T09:08:51Zby Sheetz, Michael.<br/>Format: Books<br/>Publication Date 2007<br/>Crime onlineent://SD_ILS/0/SD_ILS:335522025-05-01T09:08:51Z2025-05-01T09:08:51Zby Jewkes, Yvonne, 1966-<br/>Format: Books<br/>Publication Date 2007<br/>Computer forensics : evidence collection and managementent://SD_ILS/0/SD_ILS:446032025-05-01T09:08:51Z2025-05-01T09:08:51Zby Newman, Robert C.<br/>Format: Books<br/>Publication Date 2007<br/>Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:427182025-05-01T09:08:51Z2025-05-01T09:08:51Zby Reyes, Anthony.<br/>Format: Electronic Resources<br/>Publication Date 2007<br/>Advances in digital forensics II : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 29-February 1, 2006.ent://SD_ILS/0/SD_ILS:335102025-05-01T09:08:51Z2025-05-01T09:08:51Zby IFIP International Conference on Digital Forensics (2006 : Orlando, Fla.)<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0705/2006929911.html">http://www.loc.gov/catdir/toc/fy0705/2006929911.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Crime classification manual : a standard system for investigating and classifying violent crimesent://SD_ILS/0/SD_ILS:335342025-05-01T09:08:51Z2025-05-01T09:08:51Zby Douglas, John E.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0615/2006016863.html">http://www.loc.gov/catdir/toc/ecip0615/2006016863.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Look both ways : help protect your family on the Internetent://SD_ILS/0/SD_ILS:338402025-05-01T09:08:51Z2025-05-01T09:08:51Zby Criddle, Linda.<br/>Format: Books<br/>Publication Date 2006<br/>Police innovation : contrasting perspectivesent://SD_ILS/0/SD_ILS:353882025-05-01T09:08:51Z2025-05-01T09:08:51Zby Weisburd, David.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0665/2006297067-d.html">http://www.loc.gov/catdir/enhancements/fy0665/2006297067-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0665/2006297067-t.html">http://www.loc.gov/catdir/enhancements/fy0665/2006297067-t.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Cybercrime : digital cops in a networked environmentent://SD_ILS/0/SD_ILS:334872025-05-01T09:08:51Z2025-05-01T09:08:51Zby Balkin, J. M.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip071/2006030943.html">http://www.loc.gov/catdir/toc/ecip071/2006030943.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Handbook of transnational crime &amp; justiceent://SD_ILS/0/SD_ILS:309632025-05-01T09:08:51Z2025-05-01T09:08:51Zby Reichel, Philip L.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0417/2004009278.html">http://www.loc.gov/catdir/toc/ecip0417/2004009278.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:364522025-05-01T09:08:51Z2025-05-01T09:08:51Zby Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:285102025-05-01T09:08:51Z2025-05-01T09:08:51Zby Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Cyber criminals on trialent://SD_ILS/0/SD_ILS:298702025-05-01T09:08:51Z2025-05-01T09:08:51Zby Smith, Russell G.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/cam041/2004011308.html">http://www.loc.gov/catdir/toc/cam041/2004011308.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/cam041/2004011308.html">http://www.loc.gov/catdir/description/cam041/2004011308.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Digital evidence and computer crime : forensic science, computers, and the Internetent://SD_ILS/0/SD_ILS:435142025-05-01T09:08:51Z2025-05-01T09:08:51Zby Casey, Eoghan.<br/>Format: Books<br/>Publication Date 2004<br/>Hacked, attacked & abused : digital crime exposedent://SD_ILS/0/SD_ILS:128802025-05-01T09:08:51Z2025-05-01T09:08:51Zby Lilley, Peter, 1957-<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-d.html</a><br/>Format: Books<br/>Publication Date 2002<br/>Cyber crime investigator's field guideent://SD_ILS/0/SD_ILS:278072025-05-01T09:08:51Z2025-05-01T09:08:51Zby Middleton, Bruce.<br/>Format: Books<br/>Publication Date 2002<br/>Dot.cons : crime, deviance and identity on the internetent://SD_ILS/0/SD_ILS:304712025-05-01T09:08:51Z2025-05-01T09:08:51Zby Jewkes, Yvonne, 1966-<br/>Format: Books<br/>Publication Date 2002<br/>Hackers : crime and the digital sublimeent://SD_ILS/0/SD_ILS:333442025-05-01T09:08:51Z2025-05-01T09:08:51Zby Taylor, Paul A., 1967-<br/>Format: Books<br/>Publication Date 1999<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-05-01T09:08:51Z2025-05-01T09:08:51Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>