Your search returned 55 results.

|
1.
TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 W53 2007.
2.
Ninja Hacking : Unconventional Penetration Testing Tactics and Techniques

by Wilhelm, Thomas | Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25W548 2011.
3.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65C373 2011.
4.
Digital Forensics and Investigations : People, Process, and Technologies to Defend the Enterprise.

by Sachowski, Jason.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : Taylor & Francis Group, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 .S23 2018.
5.
Advances in Human Factors in Cybersecurity : Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA.

by Ahram, Tareq Z | Nicholson, Denise.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2018Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
6.
Security solutions for hyperconnectivity and the Internet of things / Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors.

by Dawson, Maurice, 1982- [editor.] | Eltayeb, Mohamed, 1978- [editor.] | Omar, Marwan, 1982- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.15.C97 S43 2017.
7.
Combating security breaches and criminal activity in the digital sphere / S. Geetha and Asnath Victy Phamila, editors.

by Geetha, S, 1979- [editor.] | Phamila, Asnath Victy, 1978- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773 .C6495 2016.
8.
Machine Learning Forensics for Law Enforcement, Security, and Intelligence.

by Mena, Jesus.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8073 -- .M395 2011.
9.
Penetration Testing Essentials.

by Oriyano, Sean-Philip | Shimonski.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis : John Wiley & Sons, Incorporated, 2016Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .O759 2017.
10.
Dissecting the Hack : The V3rb0t3n Network

by Street, Jayson E.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 S856 2015.
11.
Computer Forensics JumpStart.

by Solomon, Micah | Barrett, Diane | Broom, Neil.

Material type: Text Text; Format: electronic available online remote Publisher: Alameda : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- S6556 2005eb.
12.
Network Attacks and Exploitation : A Framework

by Monte, Matthew.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.38 -- .M668 2015eb.
13.
Handbook of research on digital crime, cyberspace security, and information assurance / Maria Manuela Cruz-Cunha and Irene Maria Portela, editors.

by Cruz-Cunha, Maria Manuela, 1964- [editor.] | Portela, Irene Maria, 1965- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2015]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773 .H375 2015.
14.
New threats and countermeasures in digital crime and cyber terrorism / Maurice Dawson and Marwan Omar, editors.

by Dawson, Maurice, 1982- [editor.] | Omar, Marwan, 1982- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2015]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773 .N4745 2015.
15.
Cybersecurity policies and strategies for cyberwarfare prevention / Jean-Loup Richet, editor.

by Richet, Jean-Loup, 1988- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2015]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.15.C97 C923 2015.
16.
Cyber Defense and Situational Awareness.

by Kott, Alexander | Erbacher, Robert F | Wang, Cliff.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2015Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
17.
Network Attacks and Exploitation : A Framework.

by Monte, Matthew | Monte, Matthew.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : John Wiley & Sons, Incorporated, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.38 -- .M668 2015.
18.
Windows Forensic Analysis Toolkit : Advanced Analysis Techniques for Windows 8

by Carvey, Harlan.

Edition: 4th ed.Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 C3726 2014.
19.
Python Forensics : A workbench for inventing and sharing digital forensic technology

by Hosmer, Chet.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.73 .P98.
20.
Hacking and Penetration Testing with Low Power Devices.

by Polstra, Philip.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25 P5965 2015.