Your search returned 7 results.

Sort
Results
1.
Digital forensics and investigations : people, processes, and technologies to defend the enterprise / Jason Sachowski. by
Material type: Text Text; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, Taylor and Francis Group, 2018
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 363.25968 SA.D 2018.

2.
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart. by
Edition: Sixth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston, MA : Cengage, 2019
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 NE.G 2019, ...

3.
Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxon, England : Routledge, 2016
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 658.478 TR.C 2016.

4.
Digital forensics with Kali Linux : perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x / Shiva V. N. Parasram. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 PA.D 2020, ...

5.
The hacker playbook 3 : Practical guide to penetration testing / Peter Kim. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: [place of publication not identified] : Secure Planet LLC, 2018
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 KI.T 2018, ... Not available: The Knowledge Hub Library : Checked out (1).
Lists:

6.
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., 2014
Other title:
  • Detecting malware and threats in Windows, Linux, and Mac memory
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 004.50285/58 LI.A 2014, ...

7.
Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, VT : Gower, 2020
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (4)Call number: 005.8076 TR.C 2020, ...

Pages