Computer forensics for dummies
Saved in:
| Main Author: | Volonino, Linda |
|---|---|
| Other Authors: | Anzaldua, Reynaldo |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Hoboken, N.J. : Chichester :
Wiley ; John Wiley [distributor],
2008.
|
| Series: | --For dummies.
|
| Subjects: | |
| Online Access: | https://biblioteca.ues.edu.sv/acceso/elibro/?url=https%3A%2F%2Felibro.net%2Fereader%2Fbiblioues/178291 View in OPAC |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Computer forensics an essential guide for accountants, lawyers, and managers /
by: Sheetz, Michael
Published: (2007)
by: Sheetz, Michael
Published: (2007)
Aproximación a la informática forense y el derecho informático : ámbito colombiano /
by: Mesa Elneser, Ana María
Published: (2013)
by: Mesa Elneser, Ana María
Published: (2013)
Introducción a la informática forense /
by: Lázaro Domínguez, Francisco
Published: (2014)
by: Lázaro Domínguez, Francisco
Published: (2014)
Web application defender's cookbook battling hackers and protecting users /
by: Barnett, Ryan C.
Published: (2013)
by: Barnett, Ryan C.
Published: (2013)
Com s'ha de fer l'informe pericial d'un delicte inform© tic? /
by: Arqués Soldevila, Josep Maria
Published: (2016)
by: Arqués Soldevila, Josep Maria
Published: (2016)
Constelación Babieca : ataques contra redes /
by: Cot Ros, Eduard
Published: (2016)
by: Cot Ros, Eduard
Published: (2016)
Delitos contra la seguridad de los activos de los sistemas de información y comunicación en el Ecuador /
by: Ramos Mera, Jonathan Marcelo
Published: (2020)
by: Ramos Mera, Jonathan Marcelo
Published: (2020)
Fraud examination casebook with documents : a hands-on approach /
by: Beecken, William H., 1949-, et al.
Published: (2017)
by: Beecken, William H., 1949-, et al.
Published: (2017)
Whistleblowing : white-collar fraud signal detection /
by: Gottschalk, Petter, 1950-
Published: (2018)
by: Gottschalk, Petter, 1950-
Published: (2018)
Secure computer and network systems modeling, analysis and design /
by: Ye, Nong
Published: (2008)
by: Ye, Nong
Published: (2008)
Network forensics /
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Auditoría forense /
by: Márquez Arcila, René Humberto
Published: (2018)
by: Márquez Arcila, René Humberto
Published: (2018)
Análisis forense informático /
by: Guerra Soto, Mario
Published: (2022)
by: Guerra Soto, Mario
Published: (2022)
Applications of secure multiparty computation /
Published: (2015)
Published: (2015)
Computer security update
Published: (2000)
Published: (2000)
Safe computing for emerging economies /
Published: (2018)
Published: (2018)
Contra inteligencia tributaria : moderna metodología de análisis para la comprensión de operaciones simuladas y otras acciones delictivas en el sistema financiero y fiscal /
by: Sánchez Belmont, Oscar
Published: (2016)
by: Sánchez Belmont, Oscar
Published: (2016)
The journal of forensic studies in accounting and business
SAP GRC for dummies
by: Vu Broady, Denise
Published: (2008)
by: Vu Broady, Denise
Published: (2008)
Safety of computer architectures
Published: (2010)
Published: (2010)
More dos for dummies /
by: Gookin, Dan
Published: (1994)
by: Gookin, Dan
Published: (1994)
Secure multi-party computation /
Published: (2013)
Published: (2013)
Hashing in computer science fifty years of slicing and dicing /
by: Konheim, Alan G., 1934-
Published: (2010)
by: Konheim, Alan G., 1934-
Published: (2010)
Coding all-in-one for dummies /
by: Abraham, Nikhil
Published: (2017)
by: Abraham, Nikhil
Published: (2017)
Active Directory for dummies
by: Clines, Steve
Published: (2008)
by: Clines, Steve
Published: (2008)
Cybersecurity and resilience in the arctic /
Published: (2020)
Published: (2020)
Journal of computer security
Cibercriminología : ensayos y reflexiones /
by: Trujillo Mariel, Patricia Rosa Linda
Published: (2021)
by: Trujillo Mariel, Patricia Rosa Linda
Published: (2021)
Selected readings in cybersecurity /
Published: (2018)
Published: (2018)
Engineering secure and dependable software systems /
Published: (2019)
Published: (2019)
Information security in education and practice /
Published: (2021)
Published: (2021)
Ensuring network security through the use of the honeypot technique /
by: Selvaraj, Rajalakshmi, et al.
Published: (2020)
by: Selvaraj, Rajalakshmi, et al.
Published: (2020)
Security and privacy in the internet of things : challenges and solutions /
Published: (2020)
Published: (2020)
GoldMine 8 for dummies
by: Scott, Joel
Published: (2008)
by: Scott, Joel
Published: (2008)
Microsoft SQL Server 2008 for dummies
by: Chapple, Mike
Published: (2008)
by: Chapple, Mike
Published: (2008)
Microsoft Office Excel 2007 formulas & functions for dummies
by: Bluttman, Ken
Published: (2007)
by: Bluttman, Ken
Published: (2007)
Google Apps for dummies
by: Teeter, Ryan
Published: (2008)
by: Teeter, Ryan
Published: (2008)
Computer fraud & security
Published: (1996)
Published: (1996)
Fraude informático y estafa : aptitud del tipo de estafa en el derecho español ante les defraudaciones por medios informáticos /
by: Gutiérrez Francés, Ma. Luz (María Luz)
Published: (1991)
by: Gutiérrez Francés, Ma. Luz (María Luz)
Published: (1991)
Windows server 2008 for dummies
by: Tittel, Ed
Published: (2008)
by: Tittel, Ed
Published: (2008)
Similar Items
-
Computer forensics an essential guide for accountants, lawyers, and managers /
by: Sheetz, Michael
Published: (2007) -
Aproximación a la informática forense y el derecho informático : ámbito colombiano /
by: Mesa Elneser, Ana María
Published: (2013) -
Introducción a la informática forense /
by: Lázaro Domínguez, Francisco
Published: (2014) -
Web application defender's cookbook battling hackers and protecting users /
by: Barnett, Ryan C.
Published: (2013) -
Com s'ha de fer l'informe pericial d'un delicte inform© tic? /
by: Arqués Soldevila, Josep Maria
Published: (2016)