Call Number (LC) | Title | Results |
---|---|---|
HV8079 .C48 P46 1994 |
Team Investigation of Child Sexual Abuse : the Uneasy Alliance. Team Investigation of Child Sexual Abuse the Uneasy Alliance. |
2 |
HV8079.C48 P46 1994 | Team investigation of child sexual abuse : the uneasy alliance / | 1 |
HV8079.C48 R33 2003 | No crueler tyrannies : accusation, false witness, and other terrors of our times / | 1 |
HV8079.C48 U53 1990 | The real world of child interrogations / | 1 |
HV8079.C65 |
Digital forensics and cyber crime : 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings / Integrating Python with Leading Computer Forensics Platforms Fundamentals of digital forensics theory, methods, and real-life applications / Advances in digital forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised selected papers / Integrating Python with Leading Computer Forensics Platforms. Social media investigation for law enforcement / Incident response primer : how to keep from getting pwned too hard / Windows forensics analyst field guide : engage in proactive cyber defense using digital forensics techniques / Cyber Crime Investigator's Field Guide Cybercrime investigations : the comprehensive resource for everyone / Digital forensics explained / Mobile forensic investigations : a guide to evidence collection, analysis, and presentation / Digital forensics and cyber crime with Kali Linux fundamentals / Digital forensics and cyber crime 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings / Digital forensics and cyber crime : 12th EAI International Conference, ICDF2C 2021, virtual event, Singapore, December 6-9, 2021, proceedings / Cybercrime investigators handbook / Deception in the digital age : exploiting and defending human targets through computer-mediated communications / Digital forensics / Dissecting the hack : the v3rb0ten network / Introductory computer forensics : a hands-on practical approach / Mobile forensics -- the file format handbook : common file formats and file systems used in mobile devices / Big digital forensic data. Digital forensics and Internet of Things / Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business / Multimedia forensics / Practical forensic analysis of artifacts on iOS and Android devices : investigating complex mobile devices / Implementing digital forensic readiness : from reactive to proactive process / Windows registry forensics : advanced digital forensic analysis of the Windows registry / Executing Windows command line investigations : while ensuring evidentiary integrity / Practical forensic imaging : securing digital evidence with Linux tools / The basics of digital forensics : the primer for getting started in digital forensics / Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence / Operating system forensic analysis. Investigación forense de dispositivos móviles Android. Capture and analysis of network-based evidence. Fundamentals of digital forensics : theory, methods, and real-life applications / Python digital forensics cookbook : effective Python recipes for digital investigations / Windows forensics cookbook : 61 recipes to help you analyze Windows systems / Intelligence-driven incident response : outwitting the adversary / CCFP certified cyber forensics professional certification : exam guide / Digital forensics and cyber crime : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings / The basics of digital forensics the primer for getting started in digital forensics / Digital image forensics : theory and implementation / Implementing digital forensic readiness from reactive to proactive process / Digital forensics : threatscape and best practices / Practical cyber forensics : an incident-based approach to forensic investigations / EnCase computer forensics : the official EnCE : EnCase certified examiner study guide / Digital forensics and cyber crime : fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised selected papers / Fundamentals of network forensics : a research perspective / Learning computer forensics / A blueprint for implementing best practice procedures in a digital forensic laboratory : meeting the requirements of ISO standards and other best practices / Digital forensics trial graphics : teaching the jury through effective use of visuals / Executing Windows command line investigations while ensuring evidentiary integrity / Digital Forensics and Cyber Crime : 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised selected papers / Cyber and digital forensic investigations a law enforcement practitioner's perspective / Machine learning for authorship attribution and cyber forensics / Digital Forensic Education an Experiential Learning Approach / Dissecting the hack : the V3rb0ten network / A practical guide to computer forensics investigations / Digital forensics |
77 |
HV8079.C65 A37 2014 |
Cyber crime and cyber terrorism investigator's handbook / Cyber crime and cyber terrorism investigator's handbook |
2 |
HV8079.C65 .A37 2014eb | Cyber crime and cyber terrorism investigator's handbook / | 4 |
HV8079.C65 A37 2014eb | Cyber crime and cyber terrorism investigator's handbook / | 1 |
HV8079.C65 A38 2024 | Advancements in cybercrime investigation and digital forensics / | 1 |
HV8079.C65 A474 2011 | Digital forensics with open source tools | 1 |
HV8079.C65 A474 2011eb |
Digital forensics with open source tools : using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. / Digital forensics with open source tools using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. / |
3 |
HV8079.C65 A57 2012 |
Mastering Windows network forensics and investigation. Mastering Windows network forensics and investigation / Mastering Windows network forensics and investigation |
4 |
HV8079.C65 B37 2010 |
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Virtualization and forensics a digital forensic investigator's guide to virtual environments / |
2 |
HV8079.C65 B54 2020 | Big data analytics and computing for digital forensic investigations / | 2 |
HV8079.C65 B55 2022 | Network forensics : privacy and security / | 2 |
HV8079.C65 B65 2011eb |
Xbox 360 forensics a digital forensics guide to examining artifacts / Xbox 360 forensics : a digital forensics guide to examining artifacts / |
2 |
HV8079.C65 B73 2023 | What to do when you get hacked : a practitioner's guide to incident response in the 21st century / | 1 |
HV8079.C65 B76 2006eb | Computer evidence : collection & preservation / | 1 |
HV8079.C65 .B76 2015 | CHFI : Computer Hacking Forensic Investigator Certification All-in-One Exam Guide / | 1 |
HV8079.C65 B76 2023 | Intelligence-Driven Incident Response : outwitting the adversary / | 1 |