Skip to contents

  1. Cross, Michael [Author] ; Shinder, Debra Littlejohn [Other]

    Scene of the cybercrime : [covering new devices, applications, laws, and regulations ; conduct bullet-proof digital forensic investigations that will stand up in court! ; acquire and analyze data from cell phones, PDAs, and MP3 players ; implement cybercrime detection techniques] - [2. ed., completely rev.]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress, c 2008

  2. Jakobsson, Markus [Editor]

    The death of the internet

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Hoboken, NJ: Wiley [u.a.], 2012

  3. Liu, Dale [Author]; Burton, James [Author]; Fowlie, Tony [Author]; Henry, Paul A. [Author]; Kanclirz, Jan Jr [Author]; Kleiman, Dave [Author]; Millar, Thomas [Author]; O´Shea, Kevin [Author]; Steele, James [Author]; Sweitzer, Scott [Author]; Wright, Craig [Author] ; Liu, Dale [Editor]

    Cisco router and switch forensics : investigating and analyzing malicious network activity

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, MA: Syngress Publishing, Inc., [2009]

  4. Shema, Mike [Author]

    Seven deadliest web application attacks

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress, 2010 ; Amsterdam [u.a.]: Elsevier, 2010

    Published in: The Seven Deadliest Attacks Series