Search Results for Computer crimes. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bcrimes.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-10-16T13:56:10ZCyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-10-16T13:56:10Z2025-10-16T13:56:10Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-10-16T13:56:10Z2025-10-16T13:56:10Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:507112025-10-16T13:56:10Z2025-10-16T13:56:10Zby Shema, Mike, author.<br/>Format: Books<br/>Publication Date 2012<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:463622025-10-16T13:56:10Z2025-10-16T13:56:10Zby Timm, Carl.<br/>Format: Books<br/>Publication Date 2010<br/>Guide to computer forensics and investigationsent://SD_ILS/0/SD_ILS:353672025-10-16T13:56:10Z2025-10-16T13:56:10Zby Nelson, Bill.<br/>Format: Books<br/>Publication Date 2008<br/>Windows Vista security : securing Vista against malicious attacksent://SD_ILS/0/SD_ILS:362852025-10-16T13:56:10Z2025-10-16T13:56:10Zby Grimes, Roger A.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0718/2007020135.html">http://www.loc.gov/catdir/toc/ecip0718/2007020135.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Look both ways : help protect your family on the Internetent://SD_ILS/0/SD_ILS:338402025-10-16T13:56:10Z2025-10-16T13:56:10Zby Criddle, Linda.<br/>Format: Books<br/>Publication Date 2006<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:364522025-10-16T13:56:10Z2025-10-16T13:56:10Zby Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:285102025-10-16T13:56:10Z2025-10-16T13:56:10Zby Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-10-16T13:56:10Z2025-10-16T13:56:10Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>