Asia Pacific University Library catalogue


Your search returned 96 results.

|
1.
Cybersecurity : public sector threats and responses / editor, Kim Andreasson.

by Andreasson, Kim J.

Series: Public administration and public policyMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: APU LibraryCall number: TK5105.59 .C93 2012 c.1 (2).

2.
Cyber forensics : from data to digital evidence / Albert J. Marcella, Jr., Frederic Guillossou.

by Marcella, Albert J | Guillossou, Frederic, 1970-.

Series: The Wiley Corporate F&A seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : John Wiley, 2012Availability: Items available for loan: APU LibraryCall number: HV8073.5 .M37 2012 c.1 (4).

3.
Internet fraud casebook : the World Wide Web of deceit / edited by Joseph T. Wells.

by Wells, Joseph T.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hoboken, N.J. : John Wiley & Sons, c2010Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: APU LibraryCall number: HV6773 .I58 2010 c.1 (2).

4.
Cybercrime : vandalizing the information society / Steven Furnell.

by Furnell, Steven, 1970-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Addison-Wesley, 2002Other title: Vandalizing the information society..Availability: Items available for loan: APU LibraryCall number: HV6773 .F87 2002 c.1 (2).

5.
Malaysian information technology & multimedia laws with regulations & rules : as at 15th August 2001 / compiled by Legal Research Board.

by Malaysia | International Law Book Services. Legal Research Board.

Series: Malaysia. Laws, etc. (International Law Book Services)Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Petaling Jaya, Selangor Darul Ehsan : International Law Book Services : Sole distributor, Golden Books Centre, 2001Other title: Malaysian information technology and multimedia laws with regulations and rules.Availability: Items available for loan: APU LibraryCall number: KPG80.C65 M35 2001 c.1 (3).

6.
Cyber laws of Malaysia : contains Digital Signature Act 1997 (Act 562), Computer Crimes Act 1997 (Act 563), Telemedicine Act 1997 (Act 564) : as at 5th January 2001 / compiled by Legal Research Board.

by Malaysia | Malaysia. Akta Jenayah Komputer 1997 | Malaysia. Akta Teleperubatan 1997 | International Law Book Services. Legal Research Board.

Series: Malaysia. Laws, etc. (International Law Book Services): Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Kuala Lumpur : International Law Book Services : Sole distributor, Golden Books Centre, 2001Availability: Items available for loan: APU LibraryCall number: KPG80.C65 M35 2001 c.1 (3).

7.
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.

by Barrett, Diane | Kipper, Gregory.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Syngress/Elsevier, c2010Availability: Items available for loan: APU LibraryCall number: HV8079.C65 B37 2010 c.1 (3).

8.
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, c2010Availability: Items available for loan: APU LibraryCall number: HV8079.C65 D54 2010 c.4 (5).

9.
Advanced persistent threat : understanding the danger and how to protect your organization / Dr. Eric Cole.

by Cole, Eric.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress, c2013Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C65 2013 c.1 (2).

10.
Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler.

by Volonino, Linda | Anzaldua, Reynaldo | Godwin, Jana.

Series: Security series (Upper Saddle River, N.J.)Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2007Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 V65 2007 c.1 (2).

11.
Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; John McCash, technical editor.

by Hoog, Andrew.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress, c2011Availability: Items available for loan: APU LibraryCall number: TK5105.885.G66 H66 2011 c.2 (3).

12.
Ninja hacking : unconventional penetration testing tactics and techniques / Thomas Wilhelm, Jason Andress.

by Wilhelm, Thomas | Andress, Jason.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress/Elsevier, c2011Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 W55 2011 c.1 (1).

13.
Incident response and computer forensics / Chris Prosise, Kevin Mandia.

by Prosise, Chris | Mandia, Kevin | Prosise, Chris. Incident response.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New York, New York : McGraw-Hill/Osborne, c2003Other title: Incident response & computer forensics.Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: APU LibraryCall number: HV6773 .P76 2003 c.1 (2).

14.
Windows forensic analysis toolkit : advanced analysis techniques for Windows 7 / Harlan Carvey ; technical editor, Jennifer Kolde.

by Carvey, Harlan A | Kolde, Jennifer.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress, c2012Availability: Items available for loan: APU LibraryCall number: HV8079.C65 C37 2012 c.1 (2).

15.
Cybercrime investigation case studies : an excerpt from placing the suspect behind the keyboard / Brett Shavers.

by Shavers, Brett.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress Media Inc, 2013Availability: Items available for loan: APU LibraryCall number: HV8079.C65 S53 2013 c.1 (2).

16.
Hacking web apps : detecting and preventing web application security problems / Mike Shema ; technical editor, Jorge Blanco Alcover.

by Shema, Mike | Alcover, Jorge Blanco.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Syngress, c2012Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S54 2012 c.1 (1).

17.
Introduction to cyber-warfare : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia.

by Shakarian, Paulo | Shakarian, Jana | Ruef, Andrew | Jajodia, Sushil.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress, c2013Availability: Items available for loan: APU LibraryCall number: U163 .S53 2013 c.1 (3).

18.
Malware forensics : investigating and analyzing malicious code / James M. Aquilina, Eoghan Casey, Cameron H. Malin.

by Aquilina, James M | Casey, Eoghan | Malin, Cameron H.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2008Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 A68 2008 c.1 (2).

19.
Digital forensics for handheld devices / Eamon P. Doherty.

by Doherty, Eamon P.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL : CRC Press, c2013Availability: Items available for loan: APU LibraryCall number: HV8079.C65 D64 2013 c.1 (1).

20.
World without secrets : business, crime, and privacy in the age of ubiquitous computing / Richard Hunter.

by Hunter, Richard, 1952-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : J. Wiley, c2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: No items available : Lost (1).