
Adobe Photoshop Forensicsby Cynthia Baron (2007) |
Alternate Data Storage Forensicsby Amber Schroader and Tyler Cohen (2007) |
Best Damn Cybercrime and Forensics Book Periodby Jack Wiles and Anthony Reyes (2007) |
CD and DVD Forensicsby Paul Crowley and Dave Kleiman (2006) |
Child Pornography: Crime, Computers and Societyby Ian O'Donnell and Claire Milner (2007) |
Computer and Intrusion Forensicsby Mohay, Anderson, Collie, de Vel and McKemmish (2003) |
Computer Evidenceby Christopher LT Brown (2005) |
Computer Forensics (3rd Edition)by John R. Vacca (2008) |
Computer Forensics and Cyber Crimeby Marie T. Britz (2003) |
Computer Forensics for Dummiesby Linda Volonino and Reynaldo Anzaldua (2008) |
Computer Forensics Jumpstartby Michael Solomon, Neil Broom and Diane Barrett (2004) |
Computer Forensics Library Boxed Setby Jones, Bejtlich, Rose, Farmer, Venema and Carrier (2007) |
Computer Forensics: Incident Response Essentialsby Warren G. Kruse and Jay G. Heiser (2001) |
Computer Forensics: Principles and Practicesby Linda Volonino, Reynaldo Anzaldua and Jana Godwin (2006) |
Computer System and Network Securityby Gregory B. White, Eric A. Fisch and Udo W. Pooch (1995) |
Cyber Crime Investigator's Field Guide (2nd Edition)by Bruce Middleton (2004) |
Cyber Forensics: A Field Manualby Albert Marcella Jr. and Doug Menendez (2007) |
Digital Evidence and Computer Crime (2nd Edition)by Eoghan Casey (2004) |
Digital Forensics: Digital Evidence in Criminal Investigationsby Angus McKenzie Marshall (2008) |
EnCase Computer Forensics - With DVD: EnCase Examiner Study Guideby Steve Bunting (2007) |
File System Forensic Analysisby Brian Carrier (2005) |
Forensic Computingby A. J. Sammes and Brian Jenkinson (2007) |
Forensic Discoveryby Dan Farmer and Wietse Venema (2005) |
Guide to Computer Forensics and Investigation (3rd Edition)by Nelson, Phillips, Enfinger and Steuart (2007) |
Hacking Exposed Computer Forensicsby Chris Davis, Aaron Philipp and David Cowen (2004) |
Handbook of Computer Crime Investigationsby Eoghan Casey (2001) |
Handbook of Digital and Multimedia Forensic Evidenceby John J. Barbara (2007) |
Incident Response and Computer Forensics (2nd Edition)by Chris Prosise, Kevin Mandia and Matt Pepe (2003) |
Information Hidingby Barni, Joancomarti, Katzenbeisser and Perez-Gonzalez (2005) |
Intelligence Support Systems: Technologies for Lawful Interceptsby Paul Hoffman and Kornel Terplan (2005) |
Internet Forensicsby Robert Jones (2005) |
Investigating Child Exploitation and Pornographyby Monique Ferraro and Eoghan Casey (2004) |
Investigating Computer Related Crimeby Peter Stephenson (1999) |
Investigating High-Tech Crimeby Michael Knetzger and Jeremy Muraski (2007) |
Investigator's Guide to Computer Crimeby Carl J. Franklin Ph.D. (2006) |
Malware Forensics: Investigating and Analyzing Malicious Codeby Cameron H. Malin, Eoghan Casey and James M. Aquilina (2008) |
Mastering Windows Network Forensics and Investigationby Steven Anson and Steve Bunting (2007) |
Multimedia Forensics and Securityby Chang-tsun Li (2008) |
Photoshop CS3 for Forensics Professionalsby George Reis (2007) |
Real Digital Forensics: Computer Security and Incident Responseby Keith J. Jones, Richard Bejtlich and Curtis W. Rose (2005) |
Scene of the Cybercrimeby Debra Littlejohn Shinder and Ed Tittle (2002) |
Sex Offenders on the Internetby Dennis Howitt and Kerry Sheldon (2007) |
Silence on the Wire: Field Guideby Michael Zalewski (2005) |
Software Forensics: Collecting Evidence from the Scene of a Digital Crimeby Robert Slade (2004) |
Stealing the Networkby Mullen, Russell, Eller, Beale, FX FX, Hurley, Parker, Hatch and Long (2005) |
UNIX and Linux Forensic Analysis DVD Toolkitby Chris Pogue, Corey Altheide and Todd Haverkos (2008) |
Windows Forensic Analysis Including DVD Toolkitby Harlan Carvey and Dave Kleiman (2007) |
Windows Forensics and Incident Recoveryby Harlan Carvey (2004) |
Windows Forensics: Field Guide for Corporate Computer Investigationsby Chad Steel (2006) |
Wireless Crime and Forensic Investigationby Gregory Kipper (2007) |
[Back to Top] [Bookstore Home]
[Anthropology] [Archeology] [Biological & Chemical Hazards] [Bloodstain Pattern] [Bomb & Fire Investigations] [Botany] [Chemistry & Chemical Analysis] [Child / Elder Abuse] [Classroom Forensics] [Computer - Internet Investigations] [Crash Investigations] [Crime Scene Processing] [Criminal Investigations (Other)] [Criminal Law] [Criminal Profiling & Psychology] [Death Investigations] [DNA Evidence & Analysis] [Document Examination] [Expert Witness / Courtroom] [Fingerprint Evidence] [Firearms Evidence] [Footwear & Tire Track Evidence] [Forensic Art] [Forensic Nursing] [Forensic Pathology] [General Forensics] [Interviewing] [Inquiry Learning] [Medical Reference] [Microscopy] [NIJ Publications] [Odontology] [Photography / Digital Imaging] [Report Writing] [Sex Crimes] [Toxicology][Trace Evidence] [Underwater Investigations]
[Forensic-Classroom Home] [Imprimus Forensic Services Home]
© 2001 - Imprimus Forensic Sevices, LLC