Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Psychology and Geriatrics by
bigCover of the book Discovery and Development of Antidiabetic Agents from Natural Products by
bigCover of the book Neural Networks in Finance by
bigCover of the book Analytical Methods for Coal and Coal Products by
bigCover of the book Progress in Optics by
bigCover of the book Religion and Mental Health by
bigCover of the book Cancer Disparities by
bigCover of the book Advances in Bioenergy by
bigCover of the book Desalination Sustainability by
bigCover of the book Sustainable Food Systems from Agriculture to Industry by
bigCover of the book Dynamic Random Walks by
bigCover of the book Multiphase Flow and Fluidization by
bigCover of the book Flow Analysis with Spectrophotometric and Luminometric Detection by
bigCover of the book Structural Health Monitoring (SHM) in Aerospace Structures by
bigCover of the book Traits of a Jackass Manager by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy