Search Results for identification. - Narrowed by: Computer crimes. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003didentification.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300$0026isd$003dtrue? 2025-06-08T15:12:47Z Cybercrime and espionage : an analysis of subversive multivector threats ent://SD_ILS/0/SD_ILS:45498 2025-06-08T15:12:47Z 2025-06-08T15:12:47Z by&#160;Gragido, Will.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:46217 2025-06-08T15:12:47Z 2025-06-08T15:12:47Z by&#160;Aquilina, James M.<br/>Format:&#160;Books<br/>Publication Date&#160;2008<br/> Dot.cons : crime, deviance and identity on the internet ent://SD_ILS/0/SD_ILS:30471 2025-06-08T15:12:47Z 2025-06-08T15:12:47Z by&#160;Jewkes, Yvonne, 1966-<br/>Format:&#160;Books<br/>Publication Date&#160;2002<br/> Computer security ent://SD_ILS/0/SD_ILS:25229 2025-06-08T15:12:47Z 2025-06-08T15:12:47Z by&#160;Carroll, John Millar.<br/>Format:&#160;Books<br/>Publication Date&#160;1996<br/>