Search Results for Computer crimes. - Narrowed by: Computer security. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bcrimes.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300?dt=list 2025-10-16T13:56:10Z Cyber Security : A practitioner's guide ent://SD_ILS/0/SD_ILS:55778 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format:&#160;Books<br/>Publication Date&#160;2017<br/> Hacking exposed : mobile security secrets &amp;amp; solutions ent://SD_ILS/0/SD_ILS:50511 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Bergman, Neil.<br/>Format:&#160;Books<br/>Publication Date&#160;2013<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:50711 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Shema, Mike, author.<br/>Format:&#160;Books<br/>Publication Date&#160;2012<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:46362 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Timm, Carl.<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:35367 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Nelson, Bill.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Windows Vista security : securing Vista against malicious attacks ent://SD_ILS/0/SD_ILS:36285 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Grimes, Roger A.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0718/2007020135.html">http://www.loc.gov/catdir/toc/ecip0718/2007020135.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2007<br/> Look both ways : help protect your family on the Internet ent://SD_ILS/0/SD_ILS:33840 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Criddle, Linda.<br/>Format:&#160;Books<br/>Publication Date&#160;2006<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:36452 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2005<br/> Software forensics : collecting evidence from the scene of a digital crime ent://SD_ILS/0/SD_ILS:28510 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a> Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format:&#160;Books<br/>Publication Date&#160;2004<br/> Computer security ent://SD_ILS/0/SD_ILS:25229 2025-10-16T13:56:10Z 2025-10-16T13:56:10Z by&#160;Carroll, John Millar.<br/>Format:&#160;Books<br/>Publication Date&#160;1996<br/>