Cybercrime Investigation Case Studies

An Excerpt from Placing the Suspect Behind the Keyboard

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cybercrime Investigation Case Studies by Brett Shavers, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Brett Shavers ISBN: 9780124095359
Publisher: Elsevier Science Publication: December 17, 2012
Imprint: Syngress Language: English
Author: Brett Shavers
ISBN: 9780124095359
Publisher: Elsevier Science
Publication: December 17, 2012
Imprint: Syngress
Language: English

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This "first look" teaches you how to place the suspect behind the keyboard using case studies.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This "first look" teaches you how to place the suspect behind the keyboard using case studies.

More books from Elsevier Science

Cover of the book Juniper(r) Networks Secure Access SSL VPN Configuration Guide by Brett Shavers
Cover of the book Non-covalent Interactions in Quantum Chemistry and Physics by Brett Shavers
Cover of the book Security Metrics Management by Brett Shavers
Cover of the book Chemometrics in Spectroscopy by Brett Shavers
Cover of the book The Biology of Human Longevity by Brett Shavers
Cover of the book Advances in Imaging and Electron Physics by Brett Shavers
Cover of the book Advances in Agronomy by Brett Shavers
Cover of the book Analysis of Turbulent Flows with Computer Programs by Brett Shavers
Cover of the book Organic Synthesis Using Biocatalysis by Brett Shavers
Cover of the book Energy, Resources and Welfare by Brett Shavers
Cover of the book New Approaches to Image Processing based Failure Analysis of Nano-Scale ULSI Devices by Brett Shavers
Cover of the book Thermal Energy Storage Technologies for Sustainability by Brett Shavers
Cover of the book International Review of Cell and Molecular Biology by Brett Shavers
Cover of the book Hormones and Reproduction of Vertebrates, Volume 2 by Brett Shavers
Cover of the book International Review of Research in Developmental Disabilities by Brett Shavers
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy