Computer forensics : investigating network intrusions and cybercrime /
Material type:

Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
LRC - Main | National University - Manila | Digital Forensic | General Circulation | GC TK 5105.59 .C66 2010 c.1 (Browse shelf (Opens below)) | c.1 | Available | NULIB000006727 | |
![]() |
LRC - Main | National University - Manila | Digital Forensic | General Circulation | GC TK 5105.59 .C66 2010 c.2 (Browse shelf (Opens below)) | c.2 | Available | NULIB000008357 |
Browsing National University - Manila shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
No cover image available |
![]() |
![]() |
||
GC TK 5105.6 .C37 2021 Computer-mediated communication : a theoretical and practical introduction to online human communication / | GC TK 5105.59 .B47 2013 Hacking exposed : mobile security secrets and solutions / | GC TK 5105.59 .C66 2010 c.1 Computer forensics : investigating network intrusions and cybercrime / | GC TK 5105.59 .C66 2010 c.2 Computer forensics : investigating network intrusions and cybercrime / | GC TK 5105.59 .M33 2021 Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices / | GC TK 5105.59 .R48 2012 c.1 Reverse deception : organized cyber threat counter-exploitation / | GC TK 5105.59 .R48 2012 c.2 Reverse deception : organized cyber threat counter-exploitation / |
Includes index.
There are no comments on this title.