Skip to content
Login
Help
العربية
Print
New Search
(More Searches)
Advanced Keyword
Title
Author
Subject
Call Number
ISBN
Author and Title
Instructor
Course
Dept.
My Library
My Library
My Account
About the library
Suggest a purchase
Comments
Help Topics
Searching
Advanced Keyword Search Tips
Saving your searches
Renewals
Fee Payment
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Author
Title
Subject
Call no.
Search
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-7 of 7)
Computer crimes -- Prevention
1
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
Engebretson, Patrick (Patrick Henry), 1974-
Amsterdam ; Boston : Syngress, an imprint of Elsevier, 2013 2013
Rating:
Request
Copies
Location
Call No.
Status
Female Library
QA76.9.A25 E5443 2013
Available
Female Library
QA76.9.A25 E5443 2013 c.2
Available
2
Corporate fraud
Comer, Michael J
London : Routledge, 1997 1997
Rating:
Request
Copies
Location
Call No.
Status
Female Library
HV6768 .C65 1997
Available
Male Library
HV6768 .C65 1997
Available
3
Cyber security culture : counteracting cyber threats through organizational learning and training
Trim, Peter R. J
London ; New York : Routledge, 2013 2013
Rating:
Request
Copies
Location
Call No.
Status
Female Library
HD30.2 .T75 2013
Available
Male Library
HD30.2 .T75 2013
Available
4
Cybercrime prevention : theory and applications
Basingstoke : Palgrave Macmillan, 2019. 2019
Rating:
Request
Copies
Location
Call No.
Status
Male Library
HV6773.C75 2019
Available
Male Library
HV6773.C75 2019 c.2
Available
Female Library
HV6773.C75 2019
Available
There are additional copies/volumes of this item
5
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
Shoemaker, Dan
Boca Raton, FL : CRC Press, 2016. 2016
Rating:
Request
Copies
Location
Call No.
Status
Male Library
QA76.9.A25 S493 2016
Available
Female Library
QA76.9.A25 S493 2016
Available
6
The hacker playbook 2 : practical guide to penetration testing
Kim, Peter
North Charleston, South Carolina : Secure Planet, LLC, 2015 2015
Rating:
Request
Copies
Location
Call No.
Status
Male Library
QA76.9.A25 K56 2015
Available
Female Library
QA76.9.A25 K56 2015
Available
7
Information risk and security : preventing and investigating workplace computer crime
Wilding, Edward
London ; New York, United States : Routledge, 2018. 2018
Rating:
Request
Copies
Location
Call No.
Status
Male Library
HV6773.W553 2018
Available
Male Library
HV6773.W553 2018 c.2
Available
Female Library
HV6773.W553 2018
Available
Add Marked to Bag
Add All On Page
Locate in results
Resources
More Information
Return to Browse
Limit/Sort Search