Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/6483Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jonathan Ham, Sherri Davidoff | - |
| dc.date.accessioned | 2022-02-10T06:40:19Z | - |
| dc.date.available | 2022-02-10T06:40:19Z | - |
| dc.date.issued | 2017 | - |
| dc.identifier.isbn | 0132564718 | - |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/6483 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Prentice Hall | en_US |
| dc.title | Network Forensics:Tracking Hackers through Cyberspace | en_US |
| dc.type | Book | en_US |
| Appears in Collections: | 0.1 Data Processing & Computer Science | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Network Forensics Tracking Hackers through Cyberspace.pdf | 410.08 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.