Adobe Photoshop Forensics by Cynthia Baron (2007) |
Alternate Data Storage Forensics by Amber Schroader and Tyler Cohen (2007) |
Best Damn Cybercrime and Forensics Book Period by Jack Wiles and Anthony Reyes (2007) |
CD and DVD Forensics by Paul Crowley and Dave Kleiman (2006) |
Child Pornography: Crime, Computers and Society by Ian O'Donnell and Claire Milner (2007) |
Computer and Intrusion Forensics by Mohay, Anderson, Collie, de Vel and McKemmish (2003) |
Computer Evidence by Christopher LT Brown (2005) |
Computer Forensics (3rd Edition) by John R. Vacca (2008) |
Computer Forensics and Cyber Crime by Marie T. Britz (2003) |
Computer Forensics for Dummies by Linda Volonino and Reynaldo Anzaldua (2008) |
Computer Forensics Jumpstart by Michael Solomon, Neil Broom and Diane Barrett (2004) |
Computer Forensics Library Boxed Set by Jones, Bejtlich, Rose, Farmer, Venema and Carrier (2007) |
Computer Forensics: Incident Response Essentials by Warren G. Kruse and Jay G. Heiser (2001) |
Computer Forensics: Principles and Practices by Linda Volonino, Reynaldo Anzaldua and Jana Godwin (2006) |
Computer System and Network Security by Gregory B. White, Eric A. Fisch and Udo W. Pooch (1995) |
Cyber Crime Investigator's Field Guide (2nd Edition) by Bruce Middleton (2004) |
Cyber Forensics: A Field Manual by Albert Marcella Jr. and Doug Menendez (2007) |
Digital Evidence and Computer Crime (2nd Edition) by Eoghan Casey (2004) |
Digital Forensics: Digital Evidence in Criminal Investigations by Angus McKenzie Marshall (2008) |
EnCase Computer Forensics - With DVD: EnCase Examiner Study Guide by Steve Bunting (2007) |
File System Forensic Analysis by Brian Carrier (2005) |
Forensic Computing by A. J. Sammes and Brian Jenkinson (2007) |
Forensic Discovery by Dan Farmer and Wietse Venema (2005) |
Guide to Computer Forensics and Investigation (3rd Edition) by Nelson, Phillips, Enfinger and Steuart (2007) |
Hacking Exposed Computer Forensics by Chris Davis, Aaron Philipp and David Cowen (2004) |
Handbook of Computer Crime Investigations by Eoghan Casey (2001) |
Handbook of Digital and Multimedia Forensic Evidence by John J. Barbara (2007) |
Incident Response and Computer Forensics (2nd Edition) by Chris Prosise, Kevin Mandia and Matt Pepe (2003) |
Information Hiding by Barni, Joancomarti, Katzenbeisser and Perez-Gonzalez (2005) |
Intelligence Support Systems: Technologies for Lawful Intercepts by Paul Hoffman and Kornel Terplan (2005) |
Internet Forensics by Robert Jones (2005) |
Investigating Child Exploitation and Pornography by Monique Ferraro and Eoghan Casey (2004) |
Investigating Computer Related Crime by Peter Stephenson (1999) |
Investigating High-Tech Crime by Michael Knetzger and Jeremy Muraski (2007) |
Investigator's Guide to Computer Crime by Carl J. Franklin Ph.D. (2006) |
Malware Forensics: Investigating and Analyzing Malicious Code by Cameron H. Malin, Eoghan Casey and James M. Aquilina (2008) |
Mastering Windows Network Forensics and Investigation by Steven Anson and Steve Bunting (2007) |
Multimedia Forensics and Security by Chang-tsun Li (2008) |
Photoshop CS3 for Forensics Professionals by George Reis (2007) |
Real Digital Forensics: Computer Security and Incident Response by Keith J. Jones, Richard Bejtlich and Curtis W. Rose (2005) |
Scene of the Cybercrime by Debra Littlejohn Shinder and Ed Tittle (2002) |
Sex Offenders on the Internet by Dennis Howitt and Kerry Sheldon (2007) |
Silence on the Wire: Field Guide by Michael Zalewski (2005) |
Software Forensics: Collecting Evidence from the Scene of a Digital Crime by Robert Slade (2004) |
Stealing the Network by Mullen, Russell, Eller, Beale, FX FX, Hurley, Parker, Hatch and Long (2005) |
UNIX and Linux Forensic Analysis DVD Toolkit by Chris Pogue, Corey Altheide and Todd Haverkos (2008) |
Windows Forensic Analysis Including DVD Toolkit by Harlan Carvey and Dave Kleiman (2007) |
Windows Forensics and Incident Recovery by Harlan Carvey (2004) |
Windows Forensics: Field Guide for Corporate Computer Investigations by Chad Steel (2006) |
Wireless Crime and Forensic Investigation by Gregory Kipper (2007) |
[Back to Top] [Bookstore Home]
[Anthropology] [Archeology] [Biological & Chemical Hazards] [Bloodstain Pattern] [Bomb & Fire Investigations] [Botany] [Chemistry & Chemical Analysis] [Child / Elder Abuse] [Classroom Forensics] [Computer - Internet Investigations] [Crash Investigations] [Crime Scene Processing] [Criminal Investigations (Other)] [Criminal Law] [Criminal Profiling & Psychology] [Death Investigations] [DNA Evidence & Analysis] [Document Examination] [Expert Witness / Courtroom] [Fingerprint Evidence] [Firearms Evidence] [Footwear & Tire Track Evidence] [Forensic Art] [Forensic Nursing] [Forensic Pathology] [General Forensics] [Interviewing] [Inquiry Learning] [Medical Reference] [Microscopy] [NIJ Publications] [Odontology] [Photography / Digital Imaging] [Report Writing] [Sex Crimes] [Toxicology][Trace Evidence] [Underwater Investigations]
[Forensic-Classroom Home] [Imprimus Forensic Services Home]
© 2001 - Imprimus Forensic Sevices, LLC