Syndetics cover image
Image from Syndetics

Cybercrime investigative case management using digital forensics and investigative techniques to identify cybercrime suspects / Brett Shavers.

By: Shavers, Brett.
Contributor(s): Shavers, Brett. Placing the suspect behind the keyboard.
Material type: TextTextSeries: Sungress: ; ITPro: Publisher: Amsterdam ; Boston : Kidlington, Oxford, U.K. ; Waltham, Mass. : Elsevier ; Syngress, 2013General Notes: EBSCO PDA Program; Title from PDF title page (viewed Apr. 4, 2013); "The material in this book is excerpted from Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects."; Title from title screen.Bibliography: Includes bibliographical references.Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9780124095465 (electronic bk.); 0124095461 (electronic bk.).Subject(s): Computer crimes -- Investigation | Electronic evidence | Criminal procedure | Criminal investigationGenre/Form: Electronic books. DDC classification: 363.25/968 Online resources: Access full-text materials at no charge:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

EBSCO PDA Program

Title from PDF title page (viewed Apr. 4, 2013).

"The material in this book is excerpted from Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects."

Title from title screen.

Includes bibliographical references.

There are no comments on this title.

to post a comment.

Powered by Koha