Your search returned 11 results.

1.
Computer fraud casebook : the bytes that bite / edited by Joseph T. Wells

by Wells, Joseph T.

Publication details: J. Wiley 2009Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV6773 Com (1).

2.
Hacking Exposed computer forensics : secrets and solutions / Aaron Philipp, David Cowen, Chris Davis

by Philipp, Aaron | Cowen, David | Davis, Chris.

Edition: 2nd ed.Publication details: McGraw-Hill 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Phi (1).

3.
Handbook of digital forensics and investigation / edited by Eoghan Casey; with contributions from Cory Altheide ... [et al.]

by Casey, Eoghan | Altheide, Cory.

Publication details: Elsevier Academic Press 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: TK7868 Han (2).

4.
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data / Terence V. Lillard ... [et al.]

by Lillard, Terence V.

Publication details: Elsevier/Syngress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Dig (2).

5.
iOS forensic analysis for iPhone, iPad and iPod touch / Sean Morrissey

by Morrissey, Sean.

Publication details: Apress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV 6773 Mor (2).

6.
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business executives / Erik Laykin

by Laykin, Erik.

Publication details: J. Wiley 2013Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV 8079 C65Lay (1). Damaged (2).

7.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco

by DeFranco, Joanna F.

Publication details: CRC Press 2014Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Def (1).

8.
Computer forensics and digital investigation with EnCase Forensic v7 / Suzanne Widup

by Widup, Suzanne.

Publication details: McGraw-Hill Education 2014Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 8079 C65Wid (2), HELP UNIVERSITY (HU)Call number: HV 8079 C65Wid (1).

9.
Computer forensics : InfoSec Pro guide / David Cowen

by Cowen, David.

Publication details: McGraw-Hill Education 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 8079 C65Cow (1), HELP UNIVERSITY (HU)Call number: HV 8079 C65Cow (1).

10.
Managing the risk of fraud and misconduct : meeting the challenges of a global, regulated, and digital environment / edited by Richard H. Girgenti and Timothy P. Hedley

by Girgenti, Richard H | Hedley, Timothy P.

Publication details: McGraw-Hill 2011Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5636 Man (1).

11.
Foong's Malaysia cyber, electronic evidence and information technology law / Foong Cheng Leong

by Foong, Cheng Leong | EMO.

Publication details: Thomson Reuters Asia Sdn Bhd. 2020Availability: Items available for loan: ELM LIBRARY (ELM)Call number: KF 5935 Foo (1).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha