Cybercrime investigation case studies an excerpt from Placing the suspect behind the keyboard
Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. This title teaches you how to place the suspect behind the keyboard using case studies.
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam, Netherlands Waltham, MA
Syngress
2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 49374 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219005710.0 | ||
| 008 | 130913 2013 ne a b 000 0 eng d | ||
| 020 | |a 9780124095052 | ||
| 039 | 9 | |a 201406071152 |b zul |c 201312230948 |d azraai |c 201312191040 |d azraai |y 201309131520 |z izyan | |
| 040 | |a UPNM | ||
| 090 | |a HV 8079.C65 |b S531 2013 | ||
| 100 | 1 | |a Shavers, Brett | |
| 245 | 1 | 0 | |a Cybercrime investigation case studies |b an excerpt from Placing the suspect behind the keyboard |c Brett Shavers |
| 260 | |a Amsterdam, Netherlands |a Waltham, MA |b Syngress |c 2013 | ||
| 300 | |a 42 p. |b ill. |c 23 cm. | ||
| 504 | |a Includes bibliographical references | ||
| 520 | |a Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. This title teaches you how to place the suspect behind the keyboard using case studies. | ||
| 592 | |a 9453 |b 15/11/13 |c RM61.70 |h Rima | ||
| 650 | 0 | |a Computer crimes |x Investigation |v Case studies | |
| 650 | 0 | |a Forensic sciences |x Data processing |v Case studies | |
| 650 | 0 | |a Criminal investigation |v Case studies | |
| 999 | |a vtls000050102 |c 49374 |d 49374 | ||


