Search Results for Computer security. - Narrowed by: 2007 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026ps$003d300?dt=list 2026-01-01T01:01:21Z Information management &amp; computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposium ent://SD_ILS/0/SD_ILS:944119 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Physics and theoretical computer science from numbers and languages to (quantum) cryptography security ent://SD_ILS/0/SD_ILS:940699 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Gazeau, Jean-Pierre.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=305174">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in distributed and networking systems ent://SD_ILS/0/SD_ILS:1013897 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:944260 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:1188280 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:937038 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:1186428 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment : from vulnerability to patch ent://SD_ILS/0/SD_ILS:1188273 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:1189983 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:1189104 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:939647 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:944075 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:944282 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the first European workshop on technological &amp; security issues in digital rights management (EuDiRights) ent://SD_ILS/0/SD_ILS:939160 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Yag&uuml;e, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The CEH prep guide the comprehensive guide to certified ethical hacking ent://SD_ILS/0/SD_ILS:942754 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Krutz, Ronald L., 1938-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=315200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A process for developing a common vocabulary in the information security area ent://SD_ILS/0/SD_ILS:943478 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:1186373 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:1186453 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:1185703 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Electronic Resources<br/> Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:1188277 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:1186460 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Electronic Resources<br/> Security+ study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:1186462 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491532">https://www.sciencedirect.com/science/book/9781597491532</a><br/>Format:&#160;Electronic Resources<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:1189115 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Behrens, Thorsten.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492188">https://www.sciencedirect.com/science/book/9781597492188</a><br/>Format:&#160;Electronic Resources<br/> The best damn IT security management book period ent://SD_ILS/0/SD_ILS:1189239 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Susan Snedaker.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format:&#160;Electronic Resources<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:938298 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at configuring Open Source security tools ent://SD_ILS/0/SD_ILS:1186465 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format:&#160;Electronic Resources<br/> Integrated security systems design : concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:1187997 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format:&#160;Electronic Resources<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:940434 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Tyson, Dave.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=299507">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux firewalls attack detection and response with iptables, psad, and fwsnort ent://SD_ILS/0/SD_ILS:1058453 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Rash, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software system reliability and security ent://SD_ILS/0/SD_ILS:940701 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Broy, M., 1949-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=305176">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing SQL server 2005. ent://SD_ILS/0/SD_ILS:1186475 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format:&#160;Electronic Resources<br/> Asterisk hacking. ent://SD_ILS/0/SD_ILS:1188582 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network how to own a shadow ent://SD_ILS/0/SD_ILS:938522 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289738">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-based access control ent://SD_ILS/0/SD_ILS:945221 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security+ study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:955624 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=452863">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:948015 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format:&#160;Electronic Resources<br/> K&uuml;reselle&#351;en ekonomi i&ccedil;erisinde ortaya &ccedil;&#305;kan yeni da&#287;&#305;t&#305;m kanallar&#305; ent://SD_ILS/0/SD_ILS:670980 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Sencar, &Ouml;zer, prepared<br/>Format:&#160;Books<br/> Optimizing and testing WLANs proven techniques for maximum performance ent://SD_ILS/0/SD_ILS:942353 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Alexander, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=311499">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit, ent://SD_ILS/0/SD_ILS:944076 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Uluslararas&#305; Kat&#305;l&#305;ml&#305; Bilgi G&uuml;venli&#287;i ve Kriptoloji konferans&#305; : bildiriler kitab&#305;, 13-14 Aral&#305;k 2007 = Information Security &amp; Cryptology Conference with International Participation : proceedings, 13-14 December 2007 ent://SD_ILS/0/SD_ILS:1155578 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Uluslararas&#305; Kat&#305;l&#305;ml&#305; Bilgi G&uuml;venli&#287;i ve Kriptoloji Konferans&#305; (2007 : Ankara)<br/>Format:&#160;Books<br/> Windows forensic analysis : DVD toolkit ent://SD_ILS/0/SD_ILS:1186455 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at VoIP security ent://SD_ILS/0/SD_ILS:1186463 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format:&#160;Electronic Resources<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:1188275 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format:&#160;Electronic Resources<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1189105 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format:&#160;Electronic Resources<br/> Security convergence : managing enterprise security risk ent://SD_ILS/0/SD_ILS:1186446 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Tyson, Dave.<br/><a href="http://www.sciencedirect.com/science/book/9780750684255">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684255">https://www.sciencedirect.com/science/book/9780750684255</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : implementing effective PCI data security standards ent://SD_ILS/0/SD_ILS:1186466 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format:&#160;Electronic Resources<br/> Optimizing and testing WLANs : proven techniques for maximum performance ent://SD_ILS/0/SD_ILS:1188013 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Alexander, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679862">http://www.sciencedirect.com/science/book/9780750679862</a><br/>Format:&#160;Electronic Resources<br/> Physical and logical security convergence powered by enterprise security management ent://SD_ILS/0/SD_ILS:1189088 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:1189113 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network : how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:1188268 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format:&#160;Electronic Resources<br/> The history of information security : a comprehensive handbook ent://SD_ILS/0/SD_ILS:1186523 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format:&#160;Electronic Resources<br/> Wi-Fi telephony : challenges and solutions for voice over WLANs ent://SD_ILS/0/SD_ILS:1188012 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Chandra, Praphul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679718">http://www.sciencedirect.com/science/book/9780750679718</a><br/>Format:&#160;Electronic Resources<br/> Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors ent://SD_ILS/0/SD_ILS:1186445 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Reyes, Anthony.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491334">https://www.sciencedirect.com/science/book/9781597491334</a><br/>Format:&#160;Electronic Resources<br/> The best damn cybercrime and digital forensics book period ent://SD_ILS/0/SD_ILS:1189117 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Cardwell, Kevin.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492287">http://www.sciencedirect.com/science/book/9781597492287</a><br/>Format:&#160;Electronic Resources<br/> CD and DVD forensics ent://SD_ILS/0/SD_ILS:1186432 2026-01-01T01:01:21Z 2026-01-01T01:01:21Z by&#160;Crowley, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491280">https://www.sciencedirect.com/science/book/9781597491280</a><br/>Format:&#160;Electronic Resources<br/>