Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Placing the Suspect Behind the Keyboard

More books from Elsevier Science

bigCover of the book MicroRNA in Regenerative Medicine by
bigCover of the book Laboratory Methods in Microbiology by
bigCover of the book Studies in Natural Products Chemistry by
bigCover of the book Functional Diversity of Mycorrhiza and Sustainable Agriculture by
bigCover of the book Silicon Carbide Biotechnology by
bigCover of the book Master Data Management by
bigCover of the book Advances in Clinical Chemistry by
bigCover of the book Surface Production Operations: Vol 2: Design of Gas-Handling Systems and Facilities by
bigCover of the book Fundamentals of Geoenvironmental Engineering by
bigCover of the book Lignin in Polymer Composites by
bigCover of the book Secrets Stolen, Fortunes Lost by
bigCover of the book Explosion Blast Response of Composites by
bigCover of the book Memory Disorders in Clinical Practice by
bigCover of the book Law and Mental Health by
bigCover of the book Blood-Spinal Cord and Brain Barriers in Health and Disease by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy