Call Number (LC) | Title | Results |
---|---|---|
HV8079.C65 Q53 2014eb |
Cloud Storage Forensics / Cloud storage forensics Cloud storage forensics / |
4 |
HV8079.C65 R44 2019 | Practical Cyber Forensics : an Incident-Based Approach to Forensic Investigations / | 1 |
HV8079.C65 R49 2007eb |
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors / Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutors / |
4 |
HV8079.C65 S235 2019 | Implementing digital forensic readiness : from reactive to proactive process / | 2 |
HV8079.C65 S33 2018 | Digital forensics and investigations : people, process, and technologies to defend the enterprise / | 1 |
HV8079.C65 S35 2012 |
The basics of digital forensics : the primer for getting started in digital forensics / The basics of digital forensics the primer for getting started in digital forensics / |
3 |
HV8079.C65 S35 2016 | Digital Forensics : threatscape and best practices / | 3 |
HV8079.C65 S37 2007 |
Alternate data storage forensics / Alternate data storage forensics |
3 |
HV8079.C65 S39 2003 | Incident response : computer forensics toolkit / | 1 |
HV8079.C65 S44 2007eb |
Computer forensics an essential guide for accountants, lawyers, and managers / Computer forensics : an essential guide for accountants, lawyers, and managers / |
2 |
HV8079.C65 .S44 2013 | Computer Forensics : an Essential Guide for Accountants, Lawyers, and Managers. | 1 |
HV8079.C65 S53 2013 |
Cybercrime case presentation : using digital forensics and investigative techniques to identify cybercrime suspects / Cybercrime investigative case management : using digital forensics and investigative techniques to identify cybercrime suspects / Cybercrime investigation case studies : an excerpt from Placing the suspect behind the keyboard / |
3 |
HV8079.C65 S53 2016 | Practical Windows forensics : leverage the power of digital forensics for Windows systems / | 1 |
HV8079.C65 S55 2014 |
Investigating internet crimes : an introduction to solving crimes in cyberspace / Investigating internet crimes an introduction to solving crimes in cyberspace / |
4 |
HV8079.C65 .S65 2005eb | Computer forensics jumpstart / | 1 |
HV8079.C65 S856 2010 | Dissecting the hack : the f0rb1dd3n network / | 1 |
HV8079.C65 S856 2010b | Dissecting the hack the forb1dd3n network / | 1 |
HV8079.C65 T76 2020 | Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques / | 3 |
HV8079.C65 V32 2014eb | System forensics, investigation, and response, second edition / | 1 |
HV8079.C65 V65 2008eb | Computer forensics for dummies / | 3 |