Search Results for Computer crimes. - Narrowed by: 2011-2014 SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bcrimes.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011-2014$0025092011-2014$0026ps$003d300?dt=list 2025-12-11T14:19:30Z Managing cyber attacks in international law, business, and relations : in search of cyber peace ent://SD_ILS/0/SD_ILS:53638 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Security awareness : applying practical security in your world ent://SD_ILS/0/SD_ILS:50225 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Ciampa, Mark.<br/>Format:&#160;Regular print<br/>Publication Date&#160;2014&#160;2013<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:50878 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Akhgar, Babak, editor of compilation.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Criminal investigation ent://SD_ILS/0/SD_ILS:52162 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Brandl, Steven G. (Steven Gerard)<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Legal education : simulation in theory and practice ent://SD_ILS/0/SD_ILS:54833 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Strevens, Caroline, editor.<br/>Format:&#160;Books<br/>Publication Date&#160;2014<br/> Criminal &amp;amp; behavioral profiling ent://SD_ILS/0/SD_ILS:50797 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Bartol, Curt R., 1940-<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:49861 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Amoroso, Edward.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cyber power : Crime, conflict and security in cyberspace. ent://SD_ILS/0/SD_ILS:50041 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Ghernaouti-H&eacute;lie, Solange, 1958-....<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking exposed : mobile security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:50511 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Bergman, Neil.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Cybercrime and society ent://SD_ILS/0/SD_ILS:51722 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Yar, Majid.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Crimes, victims and witnesses : apartheid in Palestine ent://SD_ILS/0/SD_ILS:52158 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Svensson, Mats.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-b.html">http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-b.html</a> Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-d.html">http://catdir.loc.gov/catdir/enhancements/fy1312/2012526218-d.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:50711 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Shema, Mike, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Frameworks for ICT policy : government, social and legal issues ent://SD_ILS/0/SD_ILS:42393 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Adomi, Esharenana E.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Digital evidence and computer crime : forensic science, computers and the Internet ent://SD_ILS/0/SD_ILS:46197 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Casey, Eoghan.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Xbox 360 forensics : a digital forensics guide to examining artifacts ent://SD_ILS/0/SD_ILS:46214 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Bolt, Steven.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Cybercrime : investigating high-technology computer crime ent://SD_ILS/0/SD_ILS:46219 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Moore, Robert, 1976-<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Cyber criminology : exploring Internet crimes and criminal behavior ent://SD_ILS/0/SD_ILS:46365 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Jaishankar, K.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Digital forensics with open source tools ent://SD_ILS/0/SD_ILS:50710 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Altheide, Cory.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Android forensics : investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:50712 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Hoog, Andrew.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Forensic accounting and fraud examination ent://SD_ILS/0/SD_ILS:41833 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Kranacher, Mary-Jo, 1952-<br/>Format:&#160;Electronic Resources<br/>Publication Date&#160;2011<br/> Cybercrime and espionage : an analysis of subversive multivector threats ent://SD_ILS/0/SD_ILS:45498 2025-12-11T14:19:30Z 2025-12-11T14:19:30Z by&#160;Gragido, Will.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/>