Call Number (LC) Title Results
HV8079 .C48 P46 1994 Team Investigation of Child Sexual Abuse : the Uneasy Alliance.
Team Investigation of Child Sexual Abuse the Uneasy Alliance.
2
HV8079.C48 P46 1994 Team investigation of child sexual abuse : the uneasy alliance / 1
HV8079.C48 R33 2003 No crueler tyrannies : accusation, false witness, and other terrors of our times / 1
HV8079.C48 U53 1990 The real world of child interrogations / 1
HV8079.C65 Digital forensics and cyber crime : 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings /
Integrating Python with Leading Computer Forensics Platforms
Fundamentals of digital forensics theory, methods, and real-life applications /
Advances in digital forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised selected papers /
Integrating Python with Leading Computer Forensics Platforms.
Social media investigation for law enforcement /
Incident response primer : how to keep from getting pwned too hard /
Windows forensics analyst field guide : engage in proactive cyber defense using digital forensics techniques /
Cyber Crime Investigator's Field Guide
Cybercrime investigations : the comprehensive resource for everyone /
Digital forensics explained /
Mobile forensic investigations : a guide to evidence collection, analysis, and presentation /
Digital forensics and cyber crime with Kali Linux fundamentals /
Digital forensics and cyber crime 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings /
Digital forensics and cyber crime : 12th EAI International Conference, ICDF2C 2021, virtual event, Singapore, December 6-9, 2021, proceedings /
Cybercrime investigators handbook /
Deception in the digital age : exploiting and defending human targets through computer-mediated communications /
Digital forensics /
Dissecting the hack : the v3rb0ten network /
Introductory computer forensics : a hands-on practical approach /
Mobile forensics -- the file format handbook : common file formats and file systems used in mobile devices /
Big digital forensic data.
Digital forensics and Internet of Things /
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business /
Multimedia forensics /
Practical forensic analysis of artifacts on iOS and Android devices : investigating complex mobile devices /
Implementing digital forensic readiness : from reactive to proactive process /
Windows registry forensics : advanced digital forensic analysis of the Windows registry /
Executing Windows command line investigations : while ensuring evidentiary integrity /
Practical forensic imaging : securing digital evidence with Linux tools /
The basics of digital forensics : the primer for getting started in digital forensics /
Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence /
Operating system forensic analysis.
Investigación forense de dispositivos móviles Android.
Capture and analysis of network-based evidence.
Fundamentals of digital forensics : theory, methods, and real-life applications /
Python digital forensics cookbook : effective Python recipes for digital investigations /
Windows forensics cookbook : 61 recipes to help you analyze Windows systems /
Intelligence-driven incident response : outwitting the adversary /
CCFP certified cyber forensics professional certification : exam guide /
Digital forensics and cyber crime : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings /
The basics of digital forensics the primer for getting started in digital forensics /
Digital image forensics : theory and implementation /
Implementing digital forensic readiness from reactive to proactive process /
Digital forensics : threatscape and best practices /
Practical cyber forensics : an incident-based approach to forensic investigations /
EnCase computer forensics : the official EnCE : EnCase certified examiner study guide /
Digital forensics and cyber crime : fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised selected papers /
Fundamentals of network forensics : a research perspective /
Learning computer forensics /
A blueprint for implementing best practice procedures in a digital forensic laboratory : meeting the requirements of ISO standards and other best practices /
Digital forensics trial graphics : teaching the jury through effective use of visuals /
Executing Windows command line investigations while ensuring evidentiary integrity /
Digital Forensics and Cyber Crime : 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised selected papers /
Cyber and digital forensic investigations a law enforcement practitioner's perspective /
Machine learning for authorship attribution and cyber forensics /
Digital Forensic Education an Experiential Learning Approach /
Dissecting the hack : the V3rb0ten network /
A practical guide to computer forensics investigations /
Digital forensics
77
HV8079.C65 A37 2014 Cyber crime and cyber terrorism investigator's handbook /
Cyber crime and cyber terrorism investigator's handbook
2
HV8079.C65 .A37 2014eb Cyber crime and cyber terrorism investigator's handbook / 4
HV8079.C65 A37 2014eb Cyber crime and cyber terrorism investigator's handbook / 1
HV8079.C65 A38 2024 Advancements in cybercrime investigation and digital forensics / 1
HV8079.C65 A474 2011 Digital forensics with open source tools 1
HV8079.C65 A474 2011eb Digital forensics with open source tools : using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. /
Digital forensics with open source tools using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. /
3
HV8079.C65 A57 2012 Mastering Windows network forensics and investigation.
Mastering Windows network forensics and investigation /
Mastering Windows network forensics and investigation
4
HV8079.C65 B37 2010 Virtualization and forensics : a digital forensic investigator's guide to virtual environments /
Virtualization and forensics a digital forensic investigator's guide to virtual environments /
2
HV8079.C65 B54 2020 Big data analytics and computing for digital forensic investigations / 2
HV8079.C65 B55 2022 Network forensics : privacy and security / 2
HV8079.C65 B65 2011eb Xbox 360 forensics a digital forensics guide to examining artifacts /
Xbox 360 forensics : a digital forensics guide to examining artifacts /
2
HV8079.C65 B73 2023 What to do when you get hacked : a practitioner's guide to incident response in the 21st century / 1
HV8079.C65 B76 2006eb Computer evidence : collection & preservation / 1
HV8079.C65 .B76 2015 CHFI : Computer Hacking Forensic Investigator Certification All-in-One Exam Guide / 1
HV8079.C65 B76 2023 Intelligence-Driven Incident Response : outwitting the adversary / 1