Library Logo

Your search returned 25 results. Subscribe to this search

|
1. Cyber security, cyber crime and cyber forensics : applications and perspectives

by Santanam, Raghu; Sethumadhavan, M; Virendra, Mohit.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 CYB] (1).

2. The virtual battlefield : perspectives on cyber warfare

by Czosseck, Christian; Geers, Kenneth.

Material type: book Book; Format: microfiche festschrift Publisher: Amsterdam ; Washington, DC : IOS Press, c2009Availability: Items available for loan: Dhaka University Science Library [355.02 VIR] (1).

3. Netspionage : the global threat to information

by Boni, William C; Kovacich, Gerald L.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Butterworth-Heinemann, 2000Online Access: Publisher description | Table of contents Availability: Items available for loan: Dhaka University Library [364.168 BON] (1).

4. Computer fraud and countermeasures

by Krauss, Leonard I; MacGahan, Aileen.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Englewood Cliffs, N.J. : Prentice-Hall, c1979Availability: Items available for loan: Dhaka University Library [364.1 KRC] (1).

5. Invisible threats : financial and information technology crimes and national security

by Gori, Umberto; Paparela, Ivo.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Amsterdam ; Washington, D.C. : Ios, 2006Availability: Items available for loan: Dhaka University Library [364.168 INV] (1).

6. Cybercrime : law enforcement, security and surveillance in the information age

by Thomas, Douglas; Loader, Brian.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London ; New York, N.Y. : Routledge, 2000Online Access: Publisher description | Contributor biographical information Availability: Items available for loan: Dhaka University Library [364.168 CYB] (1).

7. Hackers : crime in the digital sublime

by Taylor, Paul A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London ; New York : Routledge, 1999Online Access: Publisher description Availability: Items available for loan: Dhaka University Library [364.68 TAH] (1).

8. Crime and the internet

by Wall, David.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Routledge, c2001Online Access: Table of contents only | Publisher description Availability: Items available for loan: Dhaka University Library [004.678 CRI] (1).

9. Ethical conflicts in information and computer science, technology, and business

by Parker, Donn B; Swope, Susan; Baker, Bruce N.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Wellesley, Mass. : QED Information Sciences, c1990Availability: Items available for reference: Dhaka University Library [174.909 PAR] (1 ).

10. Compute!'s computer security

by Roberts, Ralph; Kane, Pamela.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Greensboro, N.C. : Compute! Books, c1989Availability: Items available for loan: Dhaka University Library [005.8 ROB] (1).

11. The death of the internet

by Jakobsson, Markus.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken : John Wiley & Sons, ©2012Online Access: Wiley Online Library Availability: No items available

12. Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business / [electronic resource]

by Laykin, Erik.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken : John Wiley, 2013.Online Access: Wiley Online Library Availability: No items available

13. Cyberwar and information warfare / [electronic resource]

by Ventre, Daniel.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: London : Hoboken, NJ : ISTE ; John Wiley, 2011Online Access: Wiley Online Library Availability: No items available

14. Cybercrime and cyberwarfare / [electronic resource]

by Bernik, Igor.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: London, UK : ISTE Ltd ; 2014.Online Access: Wiley Online Library Availability: No items available

15. Phishing dark waters : the offensive and defensive sides of malicious emails / [electronic resource]

by Hadnagy, Christopher; Fincher, Michele; Dreeke, Robin.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Indianapolis, IN : Wiley, [2015]Online Access: Wiley Online Library Availability: No items available

16. Network attacks and exploitation : a framework / [electronic resource]

by Monte, Matthew.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Indianapolis, IN : Wiley, 2015.Other title: Network attacks & exploitation.Online Access: Wiley Online Library Availability: No items available

17. Encyclopaedia of cyber and computer hacking

by Bhatnagar, Shilpa.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi, India : Anmol Publications, 2009Availability: Items available for reference: Dhaka University Library [005.803 BHE] (5 ).

18. Targeted cyber attacks : multi-staged attacks driven by exploits and malware / [electronic resource]

by Sood, Aditya K; Enbody, Richard J.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Amsterdam ; Syngress, 2014.Online Access: ScienceDirect Availability: No items available

19. Dissecting the hack : the v3rb0ten network / [electronic resource]

by Street, Jayson E; Sims, Kristin; Baskin, Brian; Martin, Brian.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Waltham, MA : Syngress is an imprint of Elsevier, 2015Online Access: ScienceDirect Availability: No items available

20. Digital Forensics : threatscape and best practices / [electronic resource]

by Sammons, John.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Waltham, MA : Syngress is an imprint of Elsevier, 2016.Online Access: ScienceDirect Availability: No items available

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login