Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Ordered Porous Solids by
bigCover of the book Electroless Copper and Nickel-Phosphorus Plating by
bigCover of the book Finite Physical Dimensions Optimal Thermodynamics 2 by
bigCover of the book Digital Image Processing by
bigCover of the book Enzyme Nomenclature 1978 by
bigCover of the book Neurologic Aspects of Systemic Disease, Part I by
bigCover of the book Global Supply Chain Security and Management by
bigCover of the book The Behavioral Economics of Climate Change by
bigCover of the book A Quick Guide to API 570 Certified Pipework Inspector Syllabus by
bigCover of the book Internet Law in China by
bigCover of the book Meyler's Side Effects of Analgesics and Anti-inflammatory Drugs by
bigCover of the book Advances in Virus Research by
bigCover of the book Open Innovation in the Food and Beverage Industry by
bigCover of the book Platelet Protocols by
bigCover of the book Forensic Testimony by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy