|
1.
|
Malware : fighting malicious code
by Skoudis, Ed | Zeltser, Lenny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|
|
2.
|
Internet denial of service : attack and defense mechanisms
by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
|
|
3.
|
Internet besieged : countering cyberspace scofflaws
by Denning, Dorothy E | Denning, Peter J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
|
|
4.
|
High-tech crimes revealed : cyberwar stories from the digital front
by Branigan, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
5.
|
Crackproof your software : protect your software against crackers
by Cerven, Pavol. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
|
|
6.
|
Understanding forensics in IT
by National Institute of Information Technonlogy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 363.25 NAT] (1).
|
|
7.
|
Protect Your Child on the Internet : a parent's toolkit
by Lenardon, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Viva Books, 2007Availability: Items available for loan: [Call number: 004.6780289 LEN] (2).
|
|
8.
|
Inside the spam cartel : trade secrets from the dark side
by Spammer-X. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 364.168 SPA] (1).
|
|
9.
|
Incident response: investigating computer crime
by Prosise, Chris | Mandia, Kevin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 364.168 PRO] (1).
|
|
10.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
11.
|
Cyber crime and cyber terrorism investigator's handbook
by Akhgar, Babak | Bosco, Francesca | Staniforth, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2014Availability: Items available for loan: [Call number: 364.168 AKH] (1).
|
|
12.
|
Computer crimes and digital investigations
by Walden, Ian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Oxford: Oxford University Press, 2007Availability: Items available for loan: [Call number: 345.410268 WAL] (1).
|
|
13.
|
Surveillance or security? : the risks posed by new wiretapping technologies
by Landau, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2011Availability: Items available for loan: [Call number: 363.252 LAN] (1).
|
|
14.
|
Crimeware : understanding new attacks and defenses
by Jakobsson, Markus | Ramzan, Zulfikar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 JAK] (1).
|
|
15.
|
Managing cyber threats : issues, approaches, and challenges
by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
|
|
16.
|
Advances in Digital Forensics III.
by Shenoi, Sujeet | Craiger, Philip. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: No items available Checked out (1).
|
|
17.
|
Vulnerability analysis and defense for the Internet
by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
18.
|
Insider attack and cyber security : beyond the hacker
by Stolfo, Salvatore J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
|
|
19.
|
Computer forensics : evidence collection and management
by Newman, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 NEW] (1).
|
|
20.
|
Cybercrime and society
by Yar, Majid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Sage Publications, 2006Availability: Items available for loan: [Call number: 364.168 YAR] (1).
|