Your search returned 146 results. Subscribe to this search

|
1. TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65 W53 2007.
Place hold Log in to add tags.
2. Handbook of Digital Forensics and Investigation.

by Casey, Eoghan.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK7868 .C37 2009.
3. XBOX 360 Forensics : A Digital Forensics Guide to Examining Artifacts

by Bolt, Steven.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773 B58 2011.
4. Ninja Hacking : Unconventional Penetration Testing Tactics and Techniques

by Wilhelm, Thomas | Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25W548 2011.
5. Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65C373 2011.
6. Cybercrime and Espionage : An Analysis of Subversive Multi-Vector Threats

by Gragido, Will | Pirc, John.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online KF9350.
7. Digital Forensics with Open Source Tools : Using Open Source Platform Tools for Performing Computer Forensics on TargetSystems: Windows, Mac, Linux, Unix, etc

by Altheide, Cory | Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65A474 2011.
8. Cyber Attacks : Protecting National Infrastructure, STUDENT EDITION

by Amoroso, Edward.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773.2.
9. Fanaticism, Racism, and Rage Online : Corrupting the Digital Sphere.

by Klein, Adam.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773.K545 2017.
10. Guide to Digital Forensics : A Concise and Practical Introduction.

by Kävrestad, Joakim.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65.K387 2017.
11. Security solutions for hyperconnectivity and the Internet of things / Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors.

by Dawson, Maurice, 1982- [editor.] | Eltayeb, Mohamed, 1978- [editor.] | Omar, Marwan, 1982- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773.15.C97 S43 2017.
12. Identity theft : breakthroughs in research and practice / Information Resources Management Association, editor.

by IGI Global [publisher.] | Information Resources Management Association [editor.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6675 .I344 2017.
13. Threat mitigation and detection of cyber warfare and terrorism activities / Maximiliano E. Korstanje, editor.

by Korstanje, Maximiliano [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online U163 .T49 2017.
14. Digital Forensics Trial Graphics : Teaching the Jury through Effective Use of Visuals.

by Sammons, John | Daniel, Lars.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: San Diego : Elsevier Science & Technology, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65.S266 2017.
15. Cybercrime and Business : Strategies for Global Corporate Security.

by Moskowitz, Sanford.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oxford : Elsevier Science & Technology, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773.
16. Implementing Digital Forensics Readiness From Reactive to Proactive Process.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Syngress Media Inc 2016Availability: Items available for loan: University of Texas At Tyler (1). Location(s): Stacks - 3rd Floor HV8079.C65 2016.
17. Network security attacks and countermeasures / Dileep Kumar G., Manoj Kumar Singh, and M.K. Jayanthi, editors.

by Kumar G., Dileep, 1982- [editor.] | Singh, Manoj Kumar, 1972- [editor.] | Jayanthi, M. K, 1976- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 .N3377 2016.
18. Combating security breaches and criminal activity in the digital sphere / S. Geetha and Asnath Victy Phamila, editors.

by Geetha, S, 1979- [editor.] | Phamila, Asnath Victy, 1978- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773 .C6495 2016.
19. Machine Learning Forensics for Law Enforcement, Security, and Intelligence.

by Mena, Jesus.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8073 -- .M395 2011.
20. Cybersecurity : Public Sector Threats and Responses.

by Andreasson, Kim J.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 -- .C927 2012.