1. Cybercrime, digital forensics and jurisdiction. (2015) Authors: Chawki, Mohamed, 1976-; Darwish, Ashraf; Khan, Mohammad Ayoub, 1980-; Tyagi, Sapna Record Type: Book Extent: 1 online resource (xviii, 145 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Cyberphobia : identity, trust, security and the Internet /: identity, trust, security and the Internet. ([2015]) Authors: Lucas, Edward, 1962- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Bullying beyond the schoolyard : preventing and responding to cyberbullying /: preventing and responding to cyberbullying. ([2015]) Authors: Hinduja, Sameer, 1978-; Patchin, Justin W, 1977- Record Type: Book Extent: 1 online resource (xxiii, 282 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Bullying Beyond the Schoolyard : Preventing and Responding to Cyberbullying /: Preventing and Responding to Cyberbullying. ([2015]) Authors: Hinduja, Sameer, 1978-; Patchin, Justin W, 1977- Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Cyber warfare : building the scientific foundation /: building the scientific foundation. (2015) Editors: Jajodia, Sushil; Shakarian, Paulo; Subrahmanian, V. S; Swarup, Vipin; Wang, Cliff Record Type: Book Extent: 1 online resource (xiii, 321 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Bullying beyond the schoolyard : preventing and responding to cyberbullying /: preventing and responding to cyberbullying. ([2015]) Authors: Hinduja, Sameer, 1978-; Patchin, Justin W, 1977- Record Type: Book Extent: 1 online resource (xxiii, 282 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Cybergefahr : Wie wir uns gegen Cyber-Crime und Online-Terror wehren können /: Wie wir uns gegen Cyber-Crime und Online-Terror wehren können. ([2015]) Authors: Willems, Eddy Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Cyberphobia : identity, trust, security and the Internet /: identity, trust, security and the Internet. ([2015]) Authors: Lucas, Edward, 1962- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. A comprehensive look at fraud identification and prevention. (2015) Authors: Youngblood, James, 1960- Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Operating system forensics. (2015) Authors: Messier, Ric Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗