Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ((table back) OR (table backup))
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"364 - Criminology"
Search alternatives
:
table backup »
table markup
,
tape backup
,
bootable backup
table back »
tables back
,
table brock
,
table hacks
Showing
1
-
6
of
6
Search:
'((table back) OR (table backup))'
,
query time: 0.17s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Intelligence-driven incident response : outwitting the adversary
by
Roberts, Scott J.
,
Brown, Rebekah
Published 2017
O'Reilly Media
Table of Contents:
“
...Copyright;
Table
of Contents; Foreword; Preface; Why We Wrote This Book; Who This Book Is For; How...
”
Call Number:
HV8079.C65
Read Now
2
Sexual assault in Canada : law, legal practice, and women's activism
by
Sheehy, Elizabeth A.
Published 2012
University of Ottawa Press
Table of Contents:
“
... have we come since Jane Doe? / Teresa DuBois -- Striking
back
: the viability of a civil action against...
”
Call Number:
HV6569.C3
Read Now
3
Intelligence-Driven Incident Response : outwitting the adversary
by
Brown, Rebekah
,
Roberts, Scott J.
Published 2023
O'Reilly Media, Inc.
Table of Contents:
“
...Cover -- Copyright --
Table
of Contents -- Foreword to the Second Edition -- Foreword to the First...
”
Call Number:
HV8079.C65
Read Now
4
Digital forensics and incident response : incident response tools and techniques for effective cyber threat response
by
Johansen, Gerard
Published 2022
Packt Publishing Ltd.
Table of Contents:
“
...Cover -- Title Page -- Copyright -- Contributors --
Table
of Contents -- Preface -- Part 1...
”
Call Number:
HV8073
Read Now
5
Ransomware : defending against digital extortion
by
Liska, Allan
,
Gallo, Timothy
Published 2016
O'Reilly Media
Table of Contents:
“
...Copyright;
Table
of Contents; Preface; ; Conventions Used in This Book; Using Code Examples...
”
Call Number:
QA76.76.C68
Read Now
6
Practical Windows forensics : leverage the power of digital forensics for Windows systems
by
Shaaban, Ayman
,
Sapronov, Konstantin
Published 2016
Packt Publishing
Table of Contents:
“
... --
Table
of Contents -- Preface -- Chapter 1: The Foundations and Principles of Digital Forensics -- What...
”
Call Number:
HV8079.C65
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 364 - Criminology
Year of Publication
From:
To:
Classification
364 - Criminology
005 - Computer programming, programs & data
2
331 - Labor economics
2
500 - Natural sciences & mathematics
2
363 - Other social problems & services
1
Language
English
6
Collection
O'Reilly
5
JSTOR Open Access Books
1
Author
Brown, Rebekah
2
Roberts, Scott J.
2
EBOUND Canada
1
Gallo, Timothy
1
Johansen, Gerard
1
Johnson, Jeannie L
1
more ...
Lee, Rob
1
Liska, Allan
1
Sapronov, Konstantin
1
Shaaban, Ayman
1
Sheehy, Elizabeth A.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&lookfor=%28%28table+back%29+OR+%28table+backup%29%29&type=AllFields
Send by Email
×
Loading...