Call Number (LC) | Title | Results |
---|---|---|
HV8079.C48 H48 1999 |
Assessing Allegations of Sexual Abuse in Preschool Children : Understanding Small Voices. Assessing allegations of sexual abuse in preschool children : understanding small voices / |
2 |
HV8079.C48 H48 1999eb | Assessing allegations of sexual abuse in preschool children understanding small voices / | 1 |
HV8079.C48 I58 1991 | Intervening in child sexual abuse / | 1 |
HV8079.C48 I87 | Issues in child abuse accusations. | 1 |
HV8079.C48 J66 1992 | Interviewing the sexually abused child : investigation of suspected abuse / | 1 |
HV8079.C48 M36 1995 | Child eyewitness testimony in sexual abuse investigations / | 1 |
HV8079.C48 M67 1995 | How to interview sexual abuse victims including the use of anatomical dolls / | 1 |
HV8079 .C48 P46 1994 |
Team Investigation of Child Sexual Abuse : the Uneasy Alliance. Team Investigation of Child Sexual Abuse the Uneasy Alliance. |
2 |
HV8079.C48 P46 1994 | Team investigation of child sexual abuse : the uneasy alliance / | 1 |
HV8079.C48 R33 2003 | No crueler tyrannies : accusation, false witness, and other terrors of our times / | 1 |
HV8079.C48 U53 1990 | The real world of child interrogations / | 1 |
HV8079.C65 |
Digital forensics and cyber crime : 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings / Fundamentals of digital forensics : a guide to theory, research and applications / Fundamentals of digital forensics theory, methods, and real-life applications / Integrating Python with Leading Computer Forensics Platforms Practical forensic analysis of artifacts on iOS and Android devices : investigating complex mobile devices / Machine learning for authorship attribution and cyber forensics / Advances in digital forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised selected papers / Fundamentals of network forensics : a research perspective / Digital forensics and cyber crime investigation : recent advances and future directions / Integrating Python with Leading Computer Forensics Platforms. Cyber and digital forensic investigations a law enforcement practitioner's perspective / Cybercrime investigations : the comprehensive resource for everyone / A blueprint for implementing best practice procedures in a digital forensic laboratory : meeting the requirements of ISO standards and other best practices / Executing Windows command line investigations : while ensuring evidentiary integrity / Digital forensics / The basics of digital forensics : the primer for getting started in digital forensics / Practical forensic imaging : securing digital evidence with Linux tools / Mobile forensic investigations : a guide to evidence collection, analysis, and presentation / Digital forensics and Internet of Things / Multimedia forensics / Mobile forensics -- the file format handbook : common file formats and file systems used in mobile devices / Practical cyber forensics : an incident-based approach to forensic investigations / Dissecting the hack : the V3rb0ten network / Capture and analysis of network-based evidence. Digital forensics and cyber crime with Kali Linux fundamentals / Digital forensics explained / Cloud forensics demystified : decoding cloud investigation complexities for digital forensic professionals / Digital forensics and cyber crime 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings / EnCase computer forensics : the official EnCE : EnCase certified examiner study guide / Social media investigation for law enforcement / Implementing digital forensic readiness : from reactive to proactive process / Windows registry forensics : advanced digital forensic analysis of the Windows registry / Big digital forensic data. Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business / Investigación forense de dispositivos móviles Android Dissecting the hack : the v3rb0ten network / Digital forensics and cyber crime : 12th EAI International Conference, ICDF2C 2021, virtual event, Singapore, December 6-9, 2021, proceedings / Deception in the digital age : exploiting and defending human targets through computer-mediated communications / Cybercrime investigators handbook / Windows forensics cookbook : 61 recipes to help you analyze Windows systems / Intelligence-driven incident response : outwitting the adversary / Python digital forensics cookbook : effective Python recipes for digital investigations / Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / Introductory computer forensics : a hands-on practical approach / CCFP certified cyber forensics professional certification : exam guide / Learning computer forensics / A practical guide to computer forensics investigations / Digital forensics and cyber crime : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings / Digital forensics and cyber crime : fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised selected papers / Digital image forensics : theory and implementation / Implementing digital forensic readiness from reactive to proactive process / Digital forensics : threatscape and best practices / Windows forensics analyst field guide : engage in proactive cyber defense using digital forensics techniques / Digital forensics trial graphics : teaching the jury through effective use of visuals / Cyber Crime Investigator's Field Guide Operating system forensic analysis. Executing Windows command line investigations while ensuring evidentiary integrity / The basics of digital forensics the primer for getting started in digital forensics / Incident response primer : how to keep from getting pwned too hard / Digital Forensics and Cyber Crime : 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised selected papers / Digital Forensic Education an Experiential Learning Approach / Incident Response for Windows Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems / |
83 |
HV8079.C65 A37 2014 | Cyber crime and cyber terrorism investigator's handbook | 1 |
HV8079.C65 .A37 2014eb | Cyber crime and cyber terrorism investigator's handbook / | 4 |
HV8079.C65 A37 2014eb | Cyber crime and cyber terrorism investigator's handbook / | 1 |
HV8079.C65 A474 2011eb |
Digital forensics with open source tools : using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. / Digital forensics with open source tools using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. / |
3 |
HV8079.C65 A57 2012 |
Mastering Windows network forensics and investigation. Mastering Windows network forensics and investigation / |
3 |
HV8079.C65 B37 2010 |
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Virtualization and forensics a digital forensic investigator's guide to virtual environments / |
2 |
HV8079.C65 B54 2020 | Big data analytics and computing for digital forensic investigations / | 2 |
HV8079.C65 B55 2022 | Network forensics : privacy and security / | 2 |