FEEDBACK Smiley face

Your search returned 34 results. Subscribe to this search

|
1. Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes

by Marcella, Albert J | Menendez, Doug.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Auerbach Publications, ©2008Availability:
Items available for reference: IIITD [REF 005.8 KUR-C] (1).
  (1 votes)
2. Scene of cybercrime

by Shinder, Debra Littlejohn | Cross, Michael.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Burlington : Syngress, c2008Availability:
Items available for reference: IIITD [REF 005.8 SHI-S] (1).

3. Crimeware : understanding new attacks and defenses

by Jakobsson, Markus | Ramzan, Zulfikar.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 JAK-C] (1).

4. Computer forensics and cyber crime : an introduction

by Britz, Marjie.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson, ©2009Online access: Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 BRI-C] (1).

5. Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors

by Reyes, Anthony.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Rockland : Syngress, c2007Online access: Publisher description Availability:
Items available for reference: IIITD [REF 005.8 REY-C] (1).

6. Network forensics : tracking hackers through cyberspace

by Davidoff, Sherri | Ham, Jonathan.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2012Availability: Items available for loan: IIITD [REF 005.8 DAV-N] (1).

7. Android forensics : investigation, analysis, and mobile security for Google Android

by Hoog, Andrew.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Waltham : Syngress, c2011Availability: Items available for loan: IIITD [REF 005.4 HOO-A] (1).

8. Computer forensics and cyber crime : an introduction

by Britz, Marjie.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Pearson, ©2009Online access: Table of contents only Availability: Items available for loan: IIITD [005.8 BRI-C] (1).

9. The Da Vinci code

by Brown, Dan 1964-.

Edition: Special illustrated ed., 1st ed.Material type: book Book; Format: print ; Literary form: fiction Publisher: New York : Corgi Books, ©2004Online access: Contributor biographical information | Sample text | Publisher description Availability: Items available for loan: IIITD [F BRO-D] (1).

10. Cyber security : understanding cyber crimes, computer forensics and legal perspectives

by Godbole, Nina | Belapure, Sunit.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi ; Wiley, © 2014Availability: Items available for loan: IIITD [005.8 GOD-C] (1).

11. Sidney Sheldon's angel of the dark

by Bagshawe, Tilly | Sheldon, Sidney.

Material type: book Book; Format: print ; Literary form: fiction Publisher: New York : Harper Collins, ©2012Other title: Angel of the dark.Availability: Items available for loan: IIITD [F BAG-S] (1).

12. Computer forensics : infoSec pro guide

by Cowen, David.

Source: Safari Technical Books (Current File)Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: New Delhi : McGraw Hill Education, ©2013Online access: Full text available from Safari Technical Books (Current File) Availability: Items available for loan: IIITD [005.8 COW-C] (1).
Items available for reference: IIITD [REF 005.8 COW-C] (1).

13. Disordered minds

by Walters, Minette.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London : Pan books, ©2012Availability: Items available for loan: IIITD [F WAL-D] (2).

14. Finders keepers

by King, Stephen.

Material type: book Book; Format: print ; Literary form: novel Publisher: London Hodder and Stoughton © 2015Availability: Items available for loan: IIITD [F KIN-F] (1).

15. Gone girl

by Flynn, Gillian.

Material type: book Book; Format: print ; Literary form: novel Publisher: London : W & N, ©2012Availability: Items available for loan: IIITD [F FLY-G] (1).

16. Kingpin : how one hacker took over the billion-dollar cybercrime underground

by Poulsen, Kevin.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Broadway Books, ©2011Availability: Items available for loan: IIITD [364.16 POU-K] (1).

17. Critical events : an anthropological perspective on contemporary India

by Das, Veena.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi ; Oxford University Press, ©2018Online access: Publisher description Availability: Items available for loan: IIITD [303.4095 DAS-C] (1).

18. Mad or bad? : a critical approach to counselling and forensic psychology

by Vossler, Andreas (ed.) | Havard, Catriona (ed.) | Pike, Graham (ed.) | Barker, Meg-John (ed.) | Raabe, Bianca (ed.).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London : Sage Publications, ©2017Availability: Items available for loan: IIITD [614.15 VOS-M] (1).

19. Critical Information Infrastructures Security [electronic resource] :13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers /

by Luiijf, Eric [editor.] | Žutautaitė, Inga [editor.] | Hämmerli, Bernhard M [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available

20. Critical Infrastructure Security and Resilience [electronic resource] :Theories, Methods, Tools and Technologies /

by Gritzalis, Dimitris [editor.] | Theocharidou, Marianthi [editor.] | Stergiopoulos, George [editor.] | SpringerLink (Online service).

Edition: 1st ed. 2019.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Online access: Click here to access online Availability: No items available


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in