Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "follow
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"364 - Criminology"
product_txtF_mv:"O'Reilly"
Showing
1
-
20
of
35
Search:
'"follow'
,
query time: 0.07s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidence
by
Furneaux, Nick
Published 2018
Wiley
Table of Contents:
“
.... Detecting the use of cryptocurrencies -- Analysis of recovered addresses and wallets --
Following
the money...
”
Call Number:
HV8079.C65
Read Now
2
The fix : how bankers lied, cheated and colluded to rig the world's most important number
by
Vaughan, Liam
,
Finch, Gavin
Published 2017
John Wiley & Sons
Table of Contents:
“
... will
follow
-- Escape to London -- Goodbye, Big Nose -- The call -- Crossing the Street -- "What the fuck kind...
”
Call Number:
HV6771.G7
Read Now
3
Inside cyber warfare
by
Carr, Jeffrey
Published 2010
O'Reilly Media, Inc.
Table of Contents:
“
... -- Non-state hackers and the social web --
Follow
the money -- Organized crime in cyberspace...
”
Call Number:
HV6773
Read Now
4
Combating crime on the dark web : learn how to access the dark web safely and not fall victim to cybercrime
by
Nearchou, Nearchos
Published 2023
Packt publishing limited
Call Number:
HV6773
Read Now
5
Digital forensics and cyber crime with Kali Linux fundamentals
by
Muniz, Joseph
Published 2018
Pearson
“
... course with a focus on the average network engineer, so you don't need to be an IT expert to
follow
most...
”
Call Number:
HV8079.C65
Read Now
6
Security superstream : zero trust
Published 2022
O'Reilly Media, Inc.
“
... in the foundations and best practices of zero trust. Recommended
follow
-up: Read: Zero Trust Security: An Enterprise...
”
Call Number:
Q325.5
Read Now
7
Ransomware
Published 2022
O'Reilly Media, Inc.
“
... to learn about ransomware. You want to get started with bug hunting. Recommended
follow
-up: Read...
”
Call Number:
Q325.5
Read Now
8
The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator
by
Kleiman, Dave
Published 2007
Syngress
“
... to
follow
suit. The material is presented in a logical learning sequence: a section builds upon previous...
”
Call Number:
QA76.9.A25
Read Now
9
Security superstream : security in the cloud
Published 2022
O'Reilly Media, Inc.
“
...Recommended
follow
-up: Read Alice and Bob Learn Application Security (book) Take Kubernetes...
”
Call Number:
Q325.5
Read Now
10
Network forensics : tracking hackers through cyberspace
by
Davidoff, Sherri
Published 2012
Prentice Hall
“
... (lmgsecurity.com), and
follow
along to gain hands-on experience. Hackers leave footprints all across the Internet...
”
Call Number:
HV8079.C65
Read Now
11
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
by
Borges, Dan
Published 2022
Packt Publishing
“
..., and ethical hacking basics will help you
follow
along...
”
Call Number:
QA76.9.A25
Read Now
12
Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques
by
Troia, Vinny
Published 2020
Wiley
“
... of the Linux command line in order to
follow
the examples. But a person with no Linux or programming experience...
”
Call Number:
HV8079.C65
Read Now
13
Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks
by
Hassan, Nihad A.
Published 2019
Apress
Call Number:
QA76.76.C68
Read Now
14
Incident Response with Threat Intelligence : Practical Insights into Developing an Incident Response Capability Through Intelligence-Based Threat Hunting
by
Martinez, Roberto
Published 2022
Packt Publishing
Table of Contents:
“
... strategy -- Next steps --
Following
first-response procedures -- Memory acquisition -- Memory capture...
”
Call Number:
QA76.9.A25
Read Now
15
Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects
by
Shavers, Brett
Published 2013
Syngress
Table of Contents:
“
... assumptions; Who did it?; Motive and opportunity; Process of elimination; Timelines;
Follow
the Evidence...
”
Call Number:
HV8073
Read Now
16
Penetration testing essentials
by
Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents:
“
... of Test to Perform -- Gaining Permission via a Contract --
Following
the Law While Testing -- ch. 5...
”
Call Number:
QA76.9.A25
Read Now
17
Practical Windows forensics : leverage the power of digital forensics for Windows systems
by
Shaaban, Ayman
,
Sapronov, Konstantin
Published 2016
Packt Publishing
Table of Contents:
“
... -- Oral communication -- Presentation skills -- Diplomacy -- The ability to
follow
policies and procedures...
”
Call Number:
HV8079.C65
Read Now
18
Computer incident response and forensics team management : conducting a successful incident response
by
Johnson, Leighton
Published 2014
Syngress
“
... and procedures are established and
followed
by all team members...
”
Call Number:
HV8079.C65
Read Now
19
Managing a network vulnerability assessment
by
Peltier, Thomas R.
Published 2003
Auerbach Publications
“
... are available, how they work, and how to use them. By
following
the procedures outlined in this g...
”
Call Number:
TK5105.59
Read Now
20
Scene of the cybercrime
by
Cross, Michael
Published 2008
Syngress Pub.
“
... and procedures must be
followed
closely lest an investigation be contaminated and all the evidence collected...
”
Call Number:
HV8079.C65
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 364 - Criminology
Clear Filter
Collection: O'Reilly
Year of Publication
From:
To:
Classification
364 - Criminology
005 - Computer programming, programs & data
14
331 - Labor economics
12
500 - Natural sciences & mathematics
9
363 - Other social problems & services
8
330 - Economics
4
more ...
001 - Knowledge
3
006 - Special computer methods
3
658 - General management
3
332 - Financial economics
2
621 - Applied physics
2
000 - Computer science, information & general works
1
300 - Social sciences
1
303 - Social processes
1
338 - Production
1
381 - Commerce
1
384 - Communications; telecommunication
1
600 - Technology
1
620 - Engineering & allied operations
1
670 - Manufacturing
1
see all ...
less ...
Language
English
35
Collection
O'Reilly
Author
Sullivan, Kevin
2
Alder, Raven
1
Bhagavatula, Ramya Sai
1
Blackley, John A.
1
Bochman, Andrew A.
1
Borges, Dan
1
more ...
Butler, William
1
Carlson, Benjamin Patrick
1
Carr, Jeffrey
1
Carvey, Harlan A.
1
Cross, Michael
1
Davidoff, Sherri
1
Dietrich, Sven
1
Dittrich, David
1
Easttom, Chuck
1
Finch, Gavin
1
Freeman, Sarah G.
1
Furneaux, Nick
1
Gogolin, Greg
1
Ham, Jonathan
1
Haqanee, Mansoor
1
Hassan, Nihad A.
1
Johnson, Leighton
1
Kleiman, Dave
1
Knottenbelt, William J.
1
Liu, Dale
1
Long, Johnny
1
Manjikian, Mary
1
Martinez, Roberto
1
Middleton, Bruce
1
Mirkovic, Jelena
1
Mullen, Timothy M.
1
Muniz, Joseph
1
Nearchou, Nearchos
1
Oppenheimer, Jerry
1
Oriyano, Sean-Philip
1
Peltier, Justin
1
Peltier, Thomas R.
1
Phelan, Jessica
1
Ramakrishnan, Ganesh
1
Reyes, Anthony
1
Romaniuk, Scott N.
1
Sapronov, Konstantin
1
Shaaban, Ayman
1
Shavers, Brett
1
Shepherd, Lewis
1
Shinder, Debra Littlejohn
1
Troia, Vinny
1
Vaughan, Liam
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&filter%5B%5D=product_txtF_mv%3A%22O%27Reilly%22&lookfor=%22follow&type=AllFields
Send by Email
×
Loading...