Call Number (LC) Title Results
HV8079.C65 A practical guide to computer forensics investigations /
Operating system forensic analysis.
Capture and analysis of network-based evidence.
Windows registry forensics : advanced digital forensic analysis of the Windows registry /
Digital forensics and Internet of Things /
Computer forensics and investigations /
Practical cyber forensics : an incident-based approach to forensic investigations /
Windows forensics analyst field guide : engage in proactive cyber defense using digital forensics techniques /
Cloud forensics demystified : decoding cloud investigation complexities for digital forensic professionals /
Practical forensic analysis of artifacts on iOS and Android devices : investigating complex mobile devices /
Learning computer forensics /
Learn computer forensics : your one-stop guide to searching, analyzing, acquiring, and securing digital evidence /
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business /
Practical forensic imaging : securing digital evidence with Linux tools /
Mobile forensic investigations : a guide to evidence collection, analysis, and presentation /
Intelligence-Driven Incident Response : outwitting the adversary /
Practical Linux forensics : a guide for digital investigators /
Intelligence-driven incident response : outwitting the adversary /
Deception in the digital age : exploiting and defending human targets through computer-mediated communications /
Digital forensics and cyber crime with Kali Linux fundamentals /
Integrating Python with Leading Computer Forensics Platforms.
Dissecting the hack : the V3rb0ten network /
Incident response primer : how to keep from getting pwned too hard /
EnCase computer forensics : the official EnCE : EnCase certified examiner study guide /
Cyber Crime Investigator's Field Guide.
Python digital forensics cookbook : effective Python recipes for digital investigations /
Implementing digital forensic readiness : from reactive to proactive process /
Executing Windows command line investigations : while ensuring evidentiary integrity /
A blueprint for implementing best practice procedures in a digital forensic laboratory : meeting the requirements of ISO standards and other best practices /
Dissecting the hack : the v3rb0ten network /
The basics of digital forensics : the primer for getting started in digital forensics /
Windows forensics cookbook : 61 recipes to help you analyze Windows systems /
Mobile forensics -- the file format handbook : common file formats and file systems used in mobile devices /
Multimedia forensics /
Incident Response for Windows : Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems /
Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence /
38
HV8079 .C65 2013eb Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. 1
HV8079.C65 .A37 2014eb Cyber crime and cyber terrorism investigator's handbook / 1
HV8079.C65 A474 2011eb Digital forensics with open source tools : using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. / 1
HV8079.C65 A57 2012 Mastering Windows network forensics and investigation / 1
HV8079.C65 B36 2020 Cybercrime investigations : a comprehensive resource for everyone / 1
HV8079.C65 B37 2010 Virtualization and forensics : a digital forensic investigator's guide to virtual environments / 2
HV8079.C65 B65 2011eb Xbox 360 forensics : a digital forensics guide to examining artifacts / 1
HV8079.C65 C37 2007eb Windows forensic analysis : DVD toolkit / 1
HV8079.C65 C3726 2012 Windows forensic analysis toolkit / 1
HV8079.C65 C3726 2014eb Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / 1
HV8079.C65 C38 2009eb Windows forensic analysis DVD toolkit 2E / 1
HV8079.C65 C58 1996 Investigating computer crime / 1
HV8079.C65 C665 1989 Organizing for computer crime investigation and prosecution / 1
HV8079.C65 C68 2013 Computer forensics : infoSec Pro guide / 2
HV8079.C65 C76 2007eb CD and DVD forensics / 1
HV8079.C65 C765 2008eb Scene of the cybercrime. 1
HV8079.C65 C933 2023 Cyber investigations : a research based introduction for advanced studies / 1
HV8079.C65 D348 2012 Network forensics : tracking hackers through cyberspace / 1
HV8079.C65 D54 2010 Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / 2