Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Dynamical Systems by
bigCover of the book Metal Oxide Nanostructures by
bigCover of the book Adult Attachment by
bigCover of the book Chemical Analysis of Food: Techniques and Applications by
bigCover of the book Environmental Remediation and Restoration of Contaminated Nuclear and Norm Sites by
bigCover of the book Liner Ship Fleet Planning by
bigCover of the book FPGAs: Instant Access by
bigCover of the book Agile Data Warehousing for the Enterprise by
bigCover of the book Cryo-EM Part A: Sample Preparation and Data Collection by
bigCover of the book Advances in Agronomy by
bigCover of the book Non-Self-Adjoint Boundary Eigenvalue Problems by
bigCover of the book Practical Leadership for Biopharmaceutical Executives by
bigCover of the book Mechanisms of Memory by
bigCover of the book Carbon Nanotechnology by
bigCover of the book Mendip: Its Swallet Caves and Rock Shelters by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy