Call Number (LC) Title Results
HV8079.C48 H48 1999 Assessing Allegations of Sexual Abuse in Preschool Children : Understanding Small Voices.
Assessing allegations of sexual abuse in preschool children : understanding small voices /
2
HV8079.C48 H48 1999eb Assessing allegations of sexual abuse in preschool children understanding small voices / 1
HV8079.C48 I58 1991 Intervening in child sexual abuse / 1
HV8079.C48 I87 Issues in child abuse accusations. 1
HV8079.C48 J66 1992 Interviewing the sexually abused child : investigation of suspected abuse / 1
HV8079.C48 M36 1995 Child eyewitness testimony in sexual abuse investigations / 1
HV8079.C48 M67 1995 How to interview sexual abuse victims including the use of anatomical dolls / 1
HV8079 .C48 P46 1994 Team Investigation of Child Sexual Abuse : the Uneasy Alliance.
Team Investigation of Child Sexual Abuse the Uneasy Alliance.
2
HV8079.C48 P46 1994 Team investigation of child sexual abuse : the uneasy alliance / 1
HV8079.C48 R33 2003 No crueler tyrannies : accusation, false witness, and other terrors of our times / 1
HV8079.C48 U53 1990 The real world of child interrogations / 1
HV8079.C65 Digital forensics and cyber crime : 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings /
Fundamentals of digital forensics : a guide to theory, research and applications /
Fundamentals of digital forensics theory, methods, and real-life applications /
Integrating Python with Leading Computer Forensics Platforms
Practical forensic analysis of artifacts on iOS and Android devices : investigating complex mobile devices /
Machine learning for authorship attribution and cyber forensics /
Advances in digital forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised selected papers /
Fundamentals of network forensics : a research perspective /
Digital forensics and cyber crime investigation : recent advances and future directions /
Integrating Python with Leading Computer Forensics Platforms.
Cyber and digital forensic investigations a law enforcement practitioner's perspective /
Cybercrime investigations : the comprehensive resource for everyone /
A blueprint for implementing best practice procedures in a digital forensic laboratory : meeting the requirements of ISO standards and other best practices /
Executing Windows command line investigations : while ensuring evidentiary integrity /
Digital forensics /
The basics of digital forensics : the primer for getting started in digital forensics /
Practical forensic imaging : securing digital evidence with Linux tools /
Mobile forensic investigations : a guide to evidence collection, analysis, and presentation /
Digital forensics and Internet of Things /
Multimedia forensics /
Mobile forensics -- the file format handbook : common file formats and file systems used in mobile devices /
Practical cyber forensics : an incident-based approach to forensic investigations /
Dissecting the hack : the V3rb0ten network /
Capture and analysis of network-based evidence.
Digital forensics and cyber crime with Kali Linux fundamentals /
Digital forensics explained /
Cloud forensics demystified : decoding cloud investigation complexities for digital forensic professionals /
Digital forensics and cyber crime 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings /
EnCase computer forensics : the official EnCE : EnCase certified examiner study guide /
Social media investigation for law enforcement /
Implementing digital forensic readiness : from reactive to proactive process /
Windows registry forensics : advanced digital forensic analysis of the Windows registry /
Big digital forensic data.
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business /
Investigación forense de dispositivos móviles Android
Dissecting the hack : the v3rb0ten network /
Digital forensics and cyber crime : 12th EAI International Conference, ICDF2C 2021, virtual event, Singapore, December 6-9, 2021, proceedings /
Deception in the digital age : exploiting and defending human targets through computer-mediated communications /
Cybercrime investigators handbook /
Windows forensics cookbook : 61 recipes to help you analyze Windows systems /
Intelligence-driven incident response : outwitting the adversary /
Python digital forensics cookbook : effective Python recipes for digital investigations /
Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence /
Introductory computer forensics : a hands-on practical approach /
CCFP certified cyber forensics professional certification : exam guide /
Learning computer forensics /
A practical guide to computer forensics investigations /
Digital forensics and cyber crime : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings /
Digital forensics and cyber crime : fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised selected papers /
Digital image forensics : theory and implementation /
Implementing digital forensic readiness from reactive to proactive process /
Digital forensics : threatscape and best practices /
Windows forensics analyst field guide : engage in proactive cyber defense using digital forensics techniques /
Digital forensics trial graphics : teaching the jury through effective use of visuals /
Cyber Crime Investigator's Field Guide
Operating system forensic analysis.
Executing Windows command line investigations while ensuring evidentiary integrity /
The basics of digital forensics the primer for getting started in digital forensics /
Incident response primer : how to keep from getting pwned too hard /
Digital Forensics and Cyber Crime : 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised selected papers /
Digital Forensic Education an Experiential Learning Approach /
Incident Response for Windows Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems /
83
HV8079.C65 A37 2014 Cyber crime and cyber terrorism investigator's handbook 1
HV8079.C65 .A37 2014eb Cyber crime and cyber terrorism investigator's handbook / 4
HV8079.C65 A37 2014eb Cyber crime and cyber terrorism investigator's handbook / 1
HV8079.C65 A474 2011eb Digital forensics with open source tools : using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. /
Digital forensics with open source tools using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. /
3
HV8079.C65 A57 2012 Mastering Windows network forensics and investigation.
Mastering Windows network forensics and investigation /
3
HV8079.C65 B37 2010 Virtualization and forensics : a digital forensic investigator's guide to virtual environments /
Virtualization and forensics a digital forensic investigator's guide to virtual environments /
2
HV8079.C65 B54 2020 Big data analytics and computing for digital forensic investigations / 2
HV8079.C65 B55 2022 Network forensics : privacy and security / 2