Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Lanzkowsky's Manual of Pediatric Hematology and Oncology by
bigCover of the book Non-Self-Adjoint Boundary Eigenvalue Problems by
bigCover of the book An Outline of Energy Metabolism in Man by
bigCover of the book Sharing Data and Models in Software Engineering by
bigCover of the book Invertebrate and Vertebrate Eye Development by
bigCover of the book Distributed Information Resources by
bigCover of the book Not Your Ordinary Librarian by
bigCover of the book Handbook of Antioxidants for Food Preservation by
bigCover of the book Applications of Mass Spectrometry Imaging to Cancer by
bigCover of the book Physical Security: 150 Things You Should Know by
bigCover of the book SQL Injection Attacks and Defense by
bigCover of the book Strategies for Growth in SMEs by
bigCover of the book Securing Intellectual Property by
bigCover of the book Sustainable Food Systems from Agriculture to Industry by
bigCover of the book Permeability Properties of Plastics and Elastomers by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy