Search Results for Identification. - Narrowed by: Computer crimes.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dIdentification.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-12-04T07:22:01ZCybercrime and espionage : an analysis of subversive multivector threatsent://SD_ILS/0/SD_ILS:454982025-12-04T07:22:01Z2025-12-04T07:22:01Zby Gragido, Will.<br/>Format: Books<br/>Publication Date 2011<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:462172025-12-04T07:22:01Z2025-12-04T07:22:01Zby Aquilina, James M.<br/>Format: Books<br/>Publication Date 2008<br/>Dot.cons : crime, deviance and identity on the internetent://SD_ILS/0/SD_ILS:304712025-12-04T07:22:01Z2025-12-04T07:22:01Zby Jewkes, Yvonne, 1966-<br/>Format: Books<br/>Publication Date 2002<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-12-04T07:22:01Z2025-12-04T07:22:01Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>