Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer crimes
Computer networks
Computer security
(7)
Electronic books
(5)
Component software
(2)
Data protection
(2)
more ...
Additional Suggested Topics
... within your search.
Internet
(2)
Microsoft Windows (Computer file)
(2)
Operating systems (Computers)
(2)
ความปลอดภัยในระบบคอมพิวเตอร์
(2)
อาชญากรรมทางคอมพิวเตอร์
(2)
Computer hackers
(1)
Electronic book
(1)
Employee crimes
(1)
Information technology
(1)
Mobile communication systems
(1)
Mobile computing
(1)
Risk assessment
(1)
less ...
Showing
1
-
11
of
11
for search:
''
, query time: 0.02s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Managing a network vulnerability assessment
by
Peltier, Thomas R.
Published 2003
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) /
by
Cappelli, Dawn
Published 2012
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
บทความ Cyber Threats 2011 /
Published 2554
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data /
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Windows registry forensics : advanced digital forensic analysis of the Windows registry /
by
Carvey, Harlan
Published 2011
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Thailand Computer Emergency Response Team Annual Report /
Published 2556
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cybercrime and cyberwarfare
by
Bernik, Igor
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Computer network security and cyber ethics
by
Kizza, Joseph Migga
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Windows forensics analysis toolkit advanced analysis techniques for Windows 8 /
by
Carvey, Harlan
Published 2014
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Hacking exposed mobile security secrets & solutions /
by
Bergman, Neil
Published 2013
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Network security attacks and countermeasures /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer crimes
Suggested Topics: Computer networks
Institution
KMUTT
(11)
Library
mai
(1)
Format
EBOOKS
(1)
Call Number
H - Social Science
(5)
Q - Science
(3)
T - Technology
(3)
Author
Carvey, Harlan
(2)
Bergman, Neil
(1)
Bernik, Igor
(1)
Cappelli, Dawn
(1)
Kizza, Joseph Migga
(1)
more ...
Peltier, Thomas R.
(1)
less ...
Language
English
(9)
Thai
(2)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website