Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Sleep Hormones by
bigCover of the book Introduction to the Theories and Varieties of Modern Crime in Financial Markets by
bigCover of the book The Chlamydomonas Sourcebook: Introduction to Chlamydomonas and Its Laboratory Use by
bigCover of the book Biochar Application by
bigCover of the book Credibility Assessment by
bigCover of the book Mechatronics and Manufacturing Engineering by
bigCover of the book Acrylamide and Other Hazardous Compounds in Heat-Treated Foods by
bigCover of the book Structural Alloys for Power Plants by
bigCover of the book Agile Systems Engineering by
bigCover of the book Sustainable Apparel by
bigCover of the book Bioinformatics by
bigCover of the book Advances in Clinical Chemistry by
bigCover of the book Agriculture's Ethical Horizon by
bigCover of the book The Moderator's Survival Guide by
bigCover of the book Glaciotectonism by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy