Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Epidemiology and Medical Statistics by
bigCover of the book Rice Quality by
bigCover of the book High Speed Digital Design by
bigCover of the book An Introduction to the Statistical Theory of Classical Simple Dense Fluids by
bigCover of the book Advances in Atomic, Molecular, and Optical Physics by
bigCover of the book Computational and Statistical Methods for Analysing Big Data with Applications by
bigCover of the book Consciousness and Cognition by
bigCover of the book Chemical Modulators of Protein Misfolding and Neurodegenerative Disease by
bigCover of the book FDA's Drug Review Process and the Package Label by
bigCover of the book Sexually Transmitted Diseases by
bigCover of the book Techno Security's Guide to Securing SCADA by
bigCover of the book Cognitive Information Systems in Management Sciences by
bigCover of the book Neural Network Models of Cognition by
bigCover of the book Polymer Modified Bitumen by
bigCover of the book Hacking and Penetration Testing with Low Power Devices by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy