Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Surface Acoustic Wave Devices and Their Signal Processing Applications by
bigCover of the book Solid State Physics by
bigCover of the book Tribology of Polymeric Nanocomposites by
bigCover of the book Climate Change Biology by
bigCover of the book Information Literacy Instruction by
bigCover of the book Pipeline and Energy Plant Piping by
bigCover of the book Singularity and Dynamics on Discontinuous Vector Fields by
bigCover of the book Interfacial and Confined Water by
bigCover of the book Threat Forecasting by
bigCover of the book Waste Materials in Construction by
bigCover of the book Post-Genomic Cardiology by
bigCover of the book Machining Technology for Composite Materials by
bigCover of the book Handbook on Natural Pigments in Food and Beverages by
bigCover of the book Insect Pathology by
bigCover of the book Advances in Energy Systems and Technology by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy