FEEDBACK Smiley face

Your search returned 23 results. Subscribe to this search

|
1. Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes

by Marcella, Albert J | Menendez, Doug.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Auerbach Publications, ©2008Availability:
Items available for reference: IIITD [REF 005.8 KUR-C] (1).
  (1 votes)
2. Scene of cybercrime

by Shinder, Debra Littlejohn | Cross, Michael.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Burlington : Syngress, c2008Availability:
Items available for reference: IIITD [REF 005.8 SHI-S] (1).

3. Crimeware : understanding new attacks and defenses

by Jakobsson, Markus | Ramzan, Zulfikar.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 JAK-C] (1).

4. Computer forensics and cyber crime : an introduction

by Britz, Marjie.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson, ©2009Online access: Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 BRI-C] (1).

5. Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors

by Reyes, Anthony.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Rockland : Syngress, c2007Online access: Publisher description Availability:
Items available for reference: IIITD [REF 005.8 REY-C] (1).

6. Network forensics : tracking hackers through cyberspace

by Davidoff, Sherri | Ham, Jonathan.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2012Availability: Items available for loan: IIITD [REF 005.8 DAV-N] (1).

7. Android forensics : investigation, analysis, and mobile security for Google Android

by Hoog, Andrew.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Waltham : Syngress, c2011Availability: Items available for loan: IIITD [REF 005.4 HOO-A] (1).

8. Computer forensics and cyber crime : an introduction

by Britz, Marjie.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Pearson, ©2009Online access: Table of contents only Availability: Items available for loan: IIITD [005.8 BRI-C] (1).

9. Cyber security : understanding cyber crimes, computer forensics and legal perspectives

by Godbole, Nina | Belapure, Sunit.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi ; Wiley, © 2014Availability: Items available for loan: IIITD [005.8 GOD-C] (1).

10. Computer forensics : infoSec pro guide

by Cowen, David.

Source: Safari Technical Books (Current File)Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: New Delhi : McGraw Hill Education, ©2013Online access: Full text available from Safari Technical Books (Current File) Availability: Items available for loan: IIITD [005.8 COW-C] (1).
Items available for reference: IIITD [REF 005.8 COW-C] (1).

11. Kingpin : how one hacker took over the billion-dollar cybercrime underground

by Poulsen, Kevin.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Broadway Books, ©2011Availability: Items available for loan: IIITD [364.16 POU-K] (1).

12. Critical Information Infrastructures Security [electronic resource] :13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers /

by Luiijf, Eric [editor.] | Žutautaitė, Inga [editor.] | Hämmerli, Bernhard M [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

13. Critical Infrastructure Security and Resilience [electronic resource] :Theories, Methods, Tools and Technologies /

by Gritzalis, Dimitris [editor.] | Theocharidou, Marianthi [editor.] | Stergiopoulos, George [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

14. Resilience of Cyber-Physical Systems [electronic resource] :From Risk Modelling to Threat Counteraction /

by Flammini, Francesco [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

15. Machine Learning and Knowledge Discovery in Databases [electronic resource] :European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part III /

by Brefeld, Ulf [editor.] | Curry, Edward [editor.] | Daly, Elizabeth [editor.] | MacNamee, Brian [editor.] | Marascu, Alice [editor.] | Pinelli, Fabio [editor.] | Berlingerio, Michele [editor.] | Hurley, Neil [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

16. Detection of Intrusions and Malware, and Vulnerability Assessment [electronic resource] :16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings /

by Perdisci, Roberto [editor.] | Maurice, Clémentine [editor.] | Giacinto, Giorgio [editor.] | Almgren, Magnus [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

17. Cybersecurity in Nigeria [electronic resource] :A Case Study of Surveillance and Prevention of Digital Crime /

by Iorliam, Aamo [author.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

18. Graphical Models for Security [electronic resource] :5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers /

by Cybenko, George [editor.] | Pym, David [editor.] | Fila, Barbara [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

19. Cyberdanger [electronic resource] :Understanding and Guarding Against Cybercrime /

by Willems, Eddy [author.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

20. Deviance in Social Media and Social Cyber Forensics [electronic resource] :Uncovering Hidden Relations Using Open Source Information (OSINF) /

by Al-khateeb, Samer [author.] | Agarwal, Nitin [author.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in