Search Results for Computer crimes. - Narrowed by: 2011-2014SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bcrimes.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011-2014$0025092011-2014$0026ps$003d300?dt=list2025-12-11T14:19:30ZManaging cyber attacks in international law, business, and relations : in search of cyber peaceent://SD_ILS/0/SD_ILS:536382025-12-11T14:19:30Z2025-12-11T14:19:30Zby Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format: Books<br/>Publication Date 2014<br/>Security awareness : applying practical security in your worldent://SD_ILS/0/SD_ILS:502252025-12-11T14:19:30Z2025-12-11T14:19:30Zby Ciampa, Mark.<br/>Format: Regular print<br/>Publication Date 2014 2013<br/>Emerging trends in ICT securityent://SD_ILS/0/SD_ILS:508782025-12-11T14:19:30Z2025-12-11T14:19:30Zby Akhgar, Babak, editor of compilation.<br/>Format: Books<br/>Publication Date 2014<br/>Criminal investigationent://SD_ILS/0/SD_ILS:521622025-12-11T14:19:30Z2025-12-11T14:19:30Zby Brandl, Steven G. (Steven Gerard)<br/>Format: Books<br/>Publication Date 2014<br/>Legal education : simulation in theory and practiceent://SD_ILS/0/SD_ILS:548332025-12-11T14:19:30Z2025-12-11T14:19:30Zby Strevens, Caroline, editor.<br/>Format: Books<br/>Publication Date 2014<br/>Criminal &amp; behavioral profilingent://SD_ILS/0/SD_ILS:507972025-12-11T14:19:30Z2025-12-11T14:19:30Zby Bartol, Curt R., 1940-<br/>Format: Books<br/>Publication Date 2013<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:498612025-12-11T14:19:30Z2025-12-11T14:19:30Zby Amoroso, Edward.<br/>Format: Books<br/>Publication Date 2013<br/>Cyber power : Crime, conflict and security in cyberspace.ent://SD_ILS/0/SD_ILS:500412025-12-11T14:19:30Z2025-12-11T14:19:30Zby Ghernaouti-Hélie, Solange, 1958-....<br/>Format: Books<br/>Publication Date 2013<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-12-11T14:19:30Z2025-12-11T14:19:30Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Cybercrime and societyent://SD_ILS/0/SD_ILS:517222025-12-11T14:19:30Z2025-12-11T14:19:30Zby Yar, Majid.<br/>Format: Books<br/>Publication Date 2013<br/>Crimes, victims and witnesses : apartheid in Palestineent://SD_ILS/0/SD_ILS:521582025-12-11T14:19:30Z2025-12-11T14:19:30Zby Svensson, Mats.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-b.html">http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-d.html">http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-d.html</a><br/>Format: Books<br/>Publication Date 2013<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:507112025-12-11T14:19:30Z2025-12-11T14:19:30Zby Shema, Mike, author.<br/>Format: Books<br/>Publication Date 2012<br/>Frameworks for ICT policy : government, social and legal issuesent://SD_ILS/0/SD_ILS:423932025-12-11T14:19:30Z2025-12-11T14:19:30Zby Adomi, Esharenana E.<br/>Format: Books<br/>Publication Date 2011<br/>Digital evidence and computer crime : forensic science, computers and the Internetent://SD_ILS/0/SD_ILS:461972025-12-11T14:19:30Z2025-12-11T14:19:30Zby Casey, Eoghan.<br/>Format: Books<br/>Publication Date 2011<br/>Xbox 360 forensics : a digital forensics guide to examining artifactsent://SD_ILS/0/SD_ILS:462142025-12-11T14:19:30Z2025-12-11T14:19:30Zby Bolt, Steven.<br/>Format: Books<br/>Publication Date 2011<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:462192025-12-11T14:19:30Z2025-12-11T14:19:30Zby Moore, Robert, 1976-<br/>Format: Books<br/>Publication Date 2011<br/>Cyber criminology : exploring Internet crimes and criminal behaviorent://SD_ILS/0/SD_ILS:463652025-12-11T14:19:30Z2025-12-11T14:19:30Zby Jaishankar, K.<br/>Format: Books<br/>Publication Date 2011<br/>Digital forensics with open source toolsent://SD_ILS/0/SD_ILS:507102025-12-11T14:19:30Z2025-12-11T14:19:30Zby Altheide, Cory.<br/>Format: Books<br/>Publication Date 2011<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:507122025-12-11T14:19:30Z2025-12-11T14:19:30Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Forensic accounting and fraud examinationent://SD_ILS/0/SD_ILS:418332025-12-11T14:19:30Z2025-12-11T14:19:30Zby Kranacher, Mary-Jo, 1952-<br/>Format: Electronic Resources<br/>Publication Date 2011<br/>Cybercrime and espionage : an analysis of subversive multivector threatsent://SD_ILS/0/SD_ILS:454982025-12-11T14:19:30Z2025-12-11T14:19:30Zby Gragido, Will.<br/>Format: Books<br/>Publication Date 2011<br/>