Search Results for Computers. - Narrowed by: Computer crimes.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputers.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-10-20T06:33:11ZDigital evidence and computer crime : forensic science, computers and the Internetent://SD_ILS/0/SD_ILS:461972025-10-20T06:33:11Z2025-10-20T06:33:11Zby Casey, Eoghan.<br/>Format: Books<br/>Publication Date 2011<br/>Digital evidence and computer crime : forensic science, computers, and the Internetent://SD_ILS/0/SD_ILS:435142025-10-20T06:33:11Z2025-10-20T06:33:11Zby Casey, Eoghan.<br/>Format: Books<br/>Publication Date 2004<br/>Cyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-10-20T06:33:11Z2025-10-20T06:33:11Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Managing cyber attacks in international law, business, and relations : in search of cyber peaceent://SD_ILS/0/SD_ILS:536382025-10-20T06:33:11Z2025-10-20T06:33:11Zby Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format: Books<br/>Publication Date 2014<br/>Cybercrime and societyent://SD_ILS/0/SD_ILS:517222025-10-20T06:33:11Z2025-10-20T06:33:11Zby Yar, Majid.<br/>Format: Books<br/>Publication Date 2013<br/>Cybercrime and espionage : an analysis of subversive multivector threatsent://SD_ILS/0/SD_ILS:454982025-10-20T06:33:11Z2025-10-20T06:33:11Zby Gragido, Will.<br/>Format: Books<br/>Publication Date 2011<br/>Cyber criminology : exploring Internet crimes and criminal behaviorent://SD_ILS/0/SD_ILS:463652025-10-20T06:33:11Z2025-10-20T06:33:11Zby Jaishankar, K.<br/>Format: Books<br/>Publication Date 2011<br/>Handbook of Internet crimeent://SD_ILS/0/SD_ILS:411342025-10-20T06:33:11Z2025-10-20T06:33:11Zby Jewkes, Yvonne, 1966-<br/>Format: Books<br/>Publication Date 2010<br/>Computer fraud casebook : the bytes that biteent://SD_ILS/0/SD_ILS:406442025-10-20T06:33:11Z2025-10-20T06:33:11Zby Wells, Joseph T.<br/>Format: Books<br/>Publication Date 2009<br/>Crime and deviance in cyberspaceent://SD_ILS/0/SD_ILS:465102025-10-20T06:33:11Z2025-10-20T06:33:11Zby Wall, David, 1956-<br/>Format: Books<br/>Publication Date 2009<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:462172025-10-20T06:33:11Z2025-10-20T06:33:11Zby Aquilina, James M.<br/>Format: Books<br/>Publication Date 2008<br/>Crime onlineent://SD_ILS/0/SD_ILS:335522025-10-20T06:33:11Z2025-10-20T06:33:11Zby Jewkes, Yvonne, 1966-<br/>Format: Books<br/>Publication Date 2007<br/>Cyber criminals on trialent://SD_ILS/0/SD_ILS:298702025-10-20T06:33:11Z2025-10-20T06:33:11Zby Smith, Russell G.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/cam041/2004011308.html">http://www.loc.gov/catdir/toc/cam041/2004011308.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/cam041/2004011308.html">http://www.loc.gov/catdir/description/cam041/2004011308.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Dot.cons : crime, deviance and identity on the internetent://SD_ILS/0/SD_ILS:304712025-10-20T06:33:11Z2025-10-20T06:33:11Zby Jewkes, Yvonne, 1966-<br/>Format: Books<br/>Publication Date 2002<br/>Hacked, attacked & abused : digital crime exposedent://SD_ILS/0/SD_ILS:128802025-10-20T06:33:11Z2025-10-20T06:33:11Zby Lilley, Peter, 1957-<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/2003428841-d.html</a><br/>Format: Books<br/>Publication Date 2002<br/>Hackers : crime and the digital sublimeent://SD_ILS/0/SD_ILS:333442025-10-20T06:33:11Z2025-10-20T06:33:11Zby Taylor, Paul A., 1967-<br/>Format: Books<br/>Publication Date 1999<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-10-20T06:33:11Z2025-10-20T06:33:11Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>