Cybercrime Investigation Case Studies An Excerpt from Placing the Suspect Behind the Keyboard
By: Shavers, Brett.
Material type: TextPublisher: Burlington : Elsevier Science, 2012General Notes: EBSCO PDA Program; Description based upon print version of record.Description: 1 online resource (49 p.).Content type: text Media type: computer Carrier type: online resourceISBN: 9780124095359 (electronic bk.); 0124095356 (electronic bk.).Subject(s): Computer crimes -- Investigation -- Case studies | Electronic evidence -- Case studies | Criminal procedure -- Case studies | Criminal investigation -- Case studiesGenre/Form: Electronic books. DDC classification: 363.25/968 | 364.973 Online resources: Access full-text materials at no charge: Summary: Cybercrime Investigation Case Studies is a ""first look"" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to findItem type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
E-book | Davenport Library e-book | E-book | 363.25/968 364.973 (Browse shelf(Opens below)) | Not For Loan | mq595823 |
Browsing Davenport Library shelves, Shelving location: e-book , Collection: E-book Close shelf browser (Hides shelf browser)
EBSCO PDA Program
Description based upon print version of record.
Cybercrime Investigation Case Studies is a ""first look"" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find
There are no comments on this title.