Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Spinal Muscular Atrophy by
bigCover of the book Nutrition, Digestion, Metabolism by
bigCover of the book Comprehensive Biophysics by
bigCover of the book Entrepreneurship in the Gulf Cooperation Council by
bigCover of the book Developments in the Formulation and Reinforcement of Concrete by
bigCover of the book Defect Structure and Properties of Nanomaterials by
bigCover of the book Advances in Catalysis by
bigCover of the book Colour Design by
bigCover of the book Advances in Marine Biology by
bigCover of the book Physiology of Ticks by
bigCover of the book Theoretical Foundations of Molecular Magnetism by
bigCover of the book Executing Data Quality Projects by
bigCover of the book Bioassays by
bigCover of the book Progress in Optics by
bigCover of the book Stochastic Models of Financial Mathematics by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy