Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book Advances in Applied Microbiology by
bigCover of the book Planning and Designing Research Animal Facilities by
bigCover of the book OSHA 2002 Recordkeeping Simplified by
bigCover of the book Plant Metabolites and Regulation under Environmental Stress by
bigCover of the book International Librarianship at Home and Abroad by
bigCover of the book Cancer Imaging by
bigCover of the book Nervous System Theory by
bigCover of the book Individualized Drug Therapy for Patients by
bigCover of the book Statistical Parametric Mapping: The Analysis of Functional Brain Images by
bigCover of the book The Stability and Shelf Life of Food by
bigCover of the book Java Web Services Architecture by
bigCover of the book Industrial Piping and Equipment Estimating Manual by
bigCover of the book Protective Clothing by
bigCover of the book Metal Oxide Nanostructures by
bigCover of the book Optimization in Renewable Energy Systems by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy