Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Object-oriented Programming with Smalltalk by
bigCover of the book Science of Gluten-Free Foods and Beverages by
bigCover of the book Mechanisms of DNA Recombination and Genome Rearrangements: Methods to Study Homologous Recombination by
bigCover of the book Introduction to Nuclear Techniques in Agronomy and Plant Biology by
bigCover of the book Practical Airport Operations, Safety, and Emergency Management by
bigCover of the book Chemical Methods of Rock Analysis by
bigCover of the book Fundamentals of Gas Lift Engineering by
bigCover of the book Resource Physiology of Conifers by
bigCover of the book Chronic Kidney Disease in Disadvantaged Populations by
bigCover of the book Advances in Microbial Physiology by
bigCover of the book Optimization Tools for Logistics by
bigCover of the book Equity and Justice in Developmental Science: Implications for Young People, Families, and Communities by
bigCover of the book Functional Neural Transplantation IV by
bigCover of the book The Classical Theory of Fields by
bigCover of the book Advances in Parasitology by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy