Handbook of research on computational forensics, digital crime, and investigation : methods and solutions
"This book provides a media for advancing research and the development of theory and practice of digital crime prevention and forensics, embracing a broad range of digital crime and forensics disciplines" -- Provided by publisher
Main Author: | Li, Chang-Tsun , 1914- (Author) |
---|---|
Corporate Author: | Gale Group |
Format: | Book |
Language: | English |
Published: |
Hershey, Pennslyvania :
Information Science Reference ,
c2010
|
Series: | Gale virtual reference library
|
Subjects: | |
Online Access: | Available for Universiti Sultan Zainal Abidin via Gale Virtual Reference Library. Click here to access |
Similar Items
Cyber crime, security and digital intelligence
by: Johnson, Mark , 1959-
Published: (2013)
by: Johnson, Mark , 1959-
Published: (2013)
Cybercrime and society
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012)
by: Cappelli, Dawn, et al.
Published: (2012)
Computer misuse : response, regulation and the law
by: Fafinski, Stefan
Published: (2009)
by: Fafinski, Stefan
Published: (2009)
Cyber terrorism : policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Computer forensics and cyber crime : an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
Guide to computer forensics and investigations : processing digital evidence
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010)
by: Nelson, Bill, et al.
Published: (2010)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
by: Nelson, Bill, et al.
Handbook of digital and multimedia forensic evidence
by: Barbara, John J.
Published: (2008)
by: Barbara, John J.
Published: (2008)
Profiling hackers : the science of criminal profiling as applied to the world of hacking
by: Chiesa, Raoul , 1973-, et al.
Published: (2009)
by: Chiesa, Raoul , 1973-, et al.
Published: (2009)
Digital forensics for handheld devices
by: Doherty, Eamon P.
Published: (2013)
by: Doherty, Eamon P.
Published: (2013)
الجرائم الدولية للانترنت
by: يوسف، يوسف حسن
Published: (2011)
by: يوسف، يوسف حسن
Published: (2011)
The basics of digital forensics : the primer for getting started in digital forensics
by: Sammons, John
Published: (2015)
by: Sammons, John
Published: (2015)
Computer forensics jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Internet fraud casebook : the World Wide Web of deceit
by: Wells, Joseph T.
Published: (2010)
by: Wells, Joseph T.
Published: (2010)
Legal framework affecting cybercrimes in Yemen with special reference to Malaysia
by: Mohammed, Ammar Abdullah Saeed
by: Mohammed, Ammar Abdullah Saeed
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)
by: Philipp, Aaron, et al.
Published: (2010)
Network forensics : tracking hackers through cyberspace
by: Davidoff, Sherri, et al.
Published: (2012)
by: Davidoff, Sherri, et al.
Published: (2012)
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business executives
by: Laykin, Erik
Published: (2013)
by: Laykin, Erik
Published: (2013)
Managerial guide for handling cyber-terrorism and information warfare
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
Unix and Linux forensic analysis DVD toolkit
by: Pogue, Chris, et al.
Published: (2008)
by: Pogue, Chris, et al.
Published: (2008)
Computer crimes and digital investigation
by: Walden, Ian
Published: (2007)
by: Walden, Ian
Published: (2007)
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Malware forensics : investigating and analyzing malicious code
by: Aquilina, James M., et al.
Published: (2008)
by: Aquilina, James M., et al.
Published: (2008)
Cyberpunk : outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991)
by: Hafner, Katie, et al.
Published: (1991)
Scene of the cybercrime
by: Cross, Michael
Published: (2008)
by: Cross, Michael
Published: (2008)
Crime prevention : approaches, practices and evaluations
by: Lab, Steven P.
Published: (2016)
by: Lab, Steven P.
Published: (2016)
Crime prevention : a critical introduction
by: Evans, Karen , 1961-
Published: (2011)
by: Evans, Karen , 1961-
Published: (2011)
A machine learning approach to phishing detection and defense
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
An introduction to crime scene investigation
by: Dutelle, Aric W.
Published: (2011)
by: Dutelle, Aric W.
Published: (2011)
Cyber security culture : counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013)
by: Trim, Peter R. J., et al.
Published: (2013)
Computer crime law
by: Kerr, Orin S.
Published: (2006)
by: Kerr, Orin S.
Published: (2006)
Crime in the future
by: Kanetkar, V. G.
Published: (1995)
by: Kanetkar, V. G.
Published: (1995)
Collaborative computer security and trust management [
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Kesedaran keselamatan siber : 101 penganalisaan ancaman siber
by: Madihah Mohd Saudi
Published: (2015)
by: Madihah Mohd Saudi
Published: (2015)
Financial investigation and forensic accounting
by: Manning, George A.
Published: (2011)
by: Manning, George A.
Published: (2011)
Similar Items
-
Cyber crime, security and digital intelligence
by: Johnson, Mark , 1959-
Published: (2013) -
Cybercrime and society
by: Yar, Majid
Published: (2006) -
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012) -
Computer misuse : response, regulation and the law
by: Fafinski, Stefan
Published: (2009) -
Cyber terrorism : policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)