close
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard | Zookal Textbooks | Zookal Textbooks
  • Author(s) Brett Shavers
  • Edition 1
  • PublishedDecember 2012
  • PublisherElsevier S & T
  • ISBN9780124095052

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This "first look" teaches you how to place the suspect behind the keyboard using case studies.

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Format
Get it instantly

Zookal account needed

$23.95
Try Zookal Study for 30 days FREE for an extra 10% 

NEW PRICE

$21.56 + free shipping

(10% off - save $2.40)

Zookal Study EOFY Special

30-day FREE trial. $14.95/mo after. Cancel anytime.

*Discount will apply at checkout.

 See terms and conditions

You will get a further 10% off for this item ($21.56 after discount) because you have added Zookal Study Premium Free Trial to your bag.

For this discount to apply, you will need to complete checkout with the Zookal Study Premium Free Trial in your bag.

-
+
  • Author(s) Brett Shavers
  • Edition 1
  • PublishedDecember 2012
  • PublisherElsevier S & T
  • ISBN9780124095052

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This "first look" teaches you how to place the suspect behind the keyboard using case studies.

translation missing: en.general.search.loading