Your search returned 20 results.

1.
Cyberbullying and cyberthreats : responding to the challenge of online social aggression, threats, and distress / Nancy E. Willard

by Willard, Nancy E.

Publication details: Research Press 2007Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: LB3013.3 Wil (1).

2.
Computer fraud casebook : the bytes that bite / edited by Joseph T. Wells

by Wells, Joseph T.

Publication details: J. Wiley 2009Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV6773 Com (1).

3.
Crime and technology : new frontiers for regulation, law enforcement and research / edited by Ernesto U. Savona

by Savona, Ernesto U.

Publication details: Springer 2004Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV6773 Cri (4).

4.
Fatal system error : the hunt for the new crime lords who are bringing down the Internet / Joseph Menn

by Menn, Joseph.

Publication details: Public Affairs 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV6773 Men (2), HMC LibraryCall number: HV6773 Men (1).

5.
Computer forensics and cyber crime : an introduction / Marjie T. Britz

by Britz, Marjie T.

Edition: 2nd ed.Publication details: Prentice Hall 2009Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Bri (1).

6.
Computer network security and cyber ethics / Joseph Migga Kizza

by Kizza, Joseph Migga.

Edition: 3rd ed.Publication details: McFarland 2011Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Kiz (3).

7.
Worm : the first digital world war / Mark Bowden

by Bowden, Mark.

Publication details: Atlantic Monthly Press 2011Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.76 C68Bow (1).

8.
Digital evidence and computer crime : forensic science, computers and the internet / Eoghan Casey ; with contributions from Susan W. Brenner ... [et al.]

by Casey, Eoghan | Brenner, Susan W.

Edition: 3rd ed.Publication details: Elsevier/Academic Press 2011Availability: No items available : Checked out (1).

9.
Computer network security and cyber ethics / Joseph Migga Kizza

by Kizza, Joseph Migga.

Edition: 4th ed.Publication details: McFarland 2014Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Kiz (2).

10.
Cybercrime and espionage : an analysis of subversive multivector threats / Will Gragido, John Pirc

by Gragido, Will | Pirc, John.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Gra (1).

11.
Cybercrime investigation case studies : an excerpt from placing the suspect behind the keyboard / Brett Shavers

by Shavers, Brett.

Publication details: Elsevier/Syngress 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Sha (1).

12.
Cybercrime investigative case management : an excerpt from placing the suspect behind the keyboard / Brett Shavers

by Shavers, Brett.

Publication details: Elsevier/Syngress 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Sha (1).

13.
Cybercrime case presentation : an excerpt from placing the suspect behind the keyboard / Brett Shavers

by Shavers, Brett.

Publication details: Elsevier/Syngress 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Sha (1).

14.
Cybercrime in progress : theory and prevention of technology-enabled offenses / Thomas J. Holt and Adam M. Bossler

by Holt, Thomas J | Bossler, Adam M.

Publication details: Routledge 2017Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Hol (1).

15.
Digital criminology : crime and justice in digital society / Anastasia Powell, Gregory Stratton, Robin Cameron

by Powell, Anastasia | Stratton, Gregory | Cameron, Robin.

Publication details: Routledge 2018Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6025 Pow (1).

16.
Computer security : art and science / Matt Bishop, Elisabeth Sullivan, Michelle Ruppel

by Bishop, Matt | Sullivan, Elisabeth | Ruppel, Michelle | EMO.

Edition: 2nd ed.Publication details: Addison-Wesley 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Bis (1).

17.
Tools and weapons : the promise and the peril of the digital age / Brad Smith and Carol Ann Browne

by Smith, Brad | Browne, Carol Ann | Gift.

Publication details: Hodder & Stoughton Ltd 2019Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HM 851 Smi (1).

18.
Introductory computer forensics : a hands-on practical approach / Xiaodong Lin

by Lin, Xiaodong | Springer (Obtain eBook from Library counter).

Publication details: Springer 2018Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Lin (1).

19.
Liability for crimes involving artificial intelligence systems / Gabriel Hallevy

by Hallevy, Gabriel | EMO.

Publication details: Springer 2015Availability: Items available for loan: ELM LIBRARY (ELM)Call number: K 5064 Hal (2).

20.
Tracers in the dark : the global hunt for the crime lords of cryptocurrency / Andy Greenberg

by Greenberg, Andy.

Publication details: Doubleday 2022Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Gre (1).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha