-
1
Investigating internet crimes an introduction to solving crimes in cyberspace
Foilsithe / Cruthaithe 2014Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
2
Business continuity and disaster recovery planning for IT professionals
Foilsithe / Cruthaithe 2014Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
3
Cyber warfare techniques, tactics and tools for security practitioners
Foilsithe / Cruthaithe 2014Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
4
Cyber security and IT infrastructure protection
Foilsithe / Cruthaithe 2014Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
5
-
6
Social media security leveraging social networking while mitigating risk
Foilsithe / Cruthaithe 2014Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
7
The basics of cloud computing understanding the fundamentals of cloud computing in theory and practice
Foilsithe / Cruthaithe 2014LEABHAR -
8
Introduction to cyber-warfare a multidisciplinary approach
Foilsithe / Cruthaithe 2013Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
9
The Basics of hacking and penetration testing ethical hacking and penetration testing made easy
Foilsithe / Cruthaithe 2013Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
10
Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management
Foilsithe / Cruthaithe 2013LEABHAR