|
Incident Response & Computer Forensics
|
Kevin Mandia |
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Completely Updated with the Latest Technique… |
OL15189060W |
|
Easy marks
|
Carolyn Keene |
Nancy goes undercover to investigate a grade-changing scheme at Brewster Academy. Someone has penetrated the school's computer and is extorting cash from students in exchange for upgrading their acad… |
OL15558582W |
|
Internet fraud casebook
|
Joseph T. Wells |
"This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive pict… |
OL15632902W |
|
Social networking
|
Roman Espejo |
"Social Networking: Understanding the Legal Issues of Social Networking Sites; Social Networks Should Be Banned at Libraries and Schools; Social Networks Should Not Be Banned at Libraries and Schools… |
OL15936841W |
|
Night Moves (Tom Clancy's Net Force, No. 3)
|
Tom Clancy,Netco Partners |
Tom Clancy's Net Force 03 |
OL159540W |
|
Piraterna
|
Anders Rydell,Sam Sundberg,Anders Rydell |
Basically the story of the file sharing site "The Pirate Bay". |
OL16080898W |
|
The hyperlink
|
Joel Naftali |
Thirteen-year-old Doug continues his blog posts about the ongoing battle against Dr. Roach and VIRUS when the CyberSkunks get trapped in cyberspace, high school "math geeks" go missing, and Auntie M … |
OL16215151W |
|
Cybercrime and espionage
|
Will Gragido |
Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence withi… |
OL16240476W |
|
Law, policy and technology
|
Eduardo Gelbstein,Pauline C. Reich |
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on c… |
OL16499595W |
|
Worm
|
Mark Bowden |
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide.… |
OL16524128W |
|
Cybercrime
|
Sara L. Latta |
"Read about this history of cybercrime, and learn about the different types of scams--from phising to spam to hacking--that take place on the internet"--Provided by publisher. |
OL16633732W |
|
Handbook of research on computational forensics, digital crime, and investigation
|
Chang-Tsun Li |
"This book provides a media for advancing research and the development of theory and practice of digital crime prevention and forensics, embracing a broad range of digital crime and forensics discipl… |
OL16925549W |
|
Fatal system error
|
Joseph Menn |
From the Publisher: In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His gui… |
OL16963728W |
|
Impeachment & Removal in Nigerian Democracy
|
Kayode Omosehin |
The book is a reliable repository for knowledge and understanding of the diverse issues involved in the impeachment and removal of the principal public officers of the three arms of the Nigerian gove… |
OL17082062W |
|
The Case Of The Digital Deception
|
Ellie O'Ryan |
Ben, Corey, and Hannah have their work cut out for them when Whitney, the most popular girl in school, comes to Club CSI: for help. At first her case seems easy to crack—someone has been tampering wi… |
OL17426868W |
|
Encyclopedia of cybercrime
|
Samuel C. McQuade |
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty… |
OL17604409W |
|
Cyber law
|
Dikdik M. Arief Mansur |
Legal aspects of information technology in Indonesia. |
OL18798939W |
|
The cyber attack survival manual
|
Selby, Nick (Police detective) |
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at an… |
OL19726345W |
|
Digital Forensics and Cyber Crime
|
Pavel Gladyshev |
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, … |
OL19843249W |
|
Claudio.com pasión en línea
|
Sonia Ehlers S. Prestán |
"Claudio es un anciano que, tras la muerte de su esposa, vive en casa de su hija junto a ella, su yerno a Ana, una oronda mujer que se encarga de las labores domésticas y a la que trata con desdén. E… |
OL20003274W |