Your search returned 9 results.

1.
Cybercrime and espionage : an analysis of subversive multivector threats / Will Gragido, John Pirc

by Gragido, Will | Pirc, John.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Gra (1).

2.
Cybercrime investigation case studies : an excerpt from placing the suspect behind the keyboard / Brett Shavers

by Shavers, Brett.

Publication details: Elsevier/Syngress 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Sha (1).

3.
Cybercrime investigative case management : an excerpt from placing the suspect behind the keyboard / Brett Shavers

by Shavers, Brett.

Publication details: Elsevier/Syngress 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Sha (1).

4.
Cybercrime case presentation : an excerpt from placing the suspect behind the keyboard / Brett Shavers

by Shavers, Brett.

Publication details: Elsevier/Syngress 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Sha (1).

5.
Security risk management : building an information security risk management program from the ground up / Evan Wheeler

by Wheeler, Evan.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: ELM LIBRARY (ELM)Call number: TK 5105.59 Whe (1).

6.
(The) basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress

by Andress, Jason.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25And (2).

7.
(The) basics of digital forensics : the primer for getting started in digital forensics / John Sammons

by Sammons, John.

Publication details: Elsevier/Syngress 2012Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 8079 C65Sam (2).

8.
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data / Terence V. Lillard ... [et al.]

by Lillard, Terence V.

Publication details: Elsevier/Syngress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Dig (2).

9.
Managing information security / John R. Vacca, editor

by Vacca, John R.

Publication details: Syngress 2009Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Man (1).

Copyright © 2024 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha