Syndetics cover image
Image from Syndetics

Cybercrime investigative case management using digital forensics and investigative techniques to identify cybercrime suspects / Brett Shavers.

By: Shavers, Brett.
Contributor(s): Shavers, Brett. Placing the suspect behind the keyboard.
Material type: TextTextSeries: Sungress: ; ITPro: Publisher: Amsterdam ; Boston : Kidlington, Oxford, U.K. ; Waltham, Mass. : Elsevier ; Syngress, 2013General Notes: EBSCO PDA Program; Title from PDF title page (viewed Apr. 4, 2013); "The material in this book is excerpted from Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects."; Title from title screen.Bibliography: Includes bibliographical references.Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9780124095465 (electronic bk.); 0124095461 (electronic bk.).Subject(s): Computer crimes -- Investigation | Electronic evidence | Criminal procedure | Criminal investigationGenre/Form: Electronic books. DDC classification: 363.25/968 Online resources: Access full-text materials at no charge:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
E-book Davenport Library e-book E-book 363.25/968 (Browse shelf(Opens below)) Not For Loan mq595787

EBSCO PDA Program

Title from PDF title page (viewed Apr. 4, 2013).

"The material in this book is excerpted from Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects."

Title from title screen.

Includes bibliographical references.

There are no comments on this title.

to post a comment.

Powered by Koha