close
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard | Zookal Textbooks | Zookal Textbooks
  • Author(s) Brett Shavers
  • Edition1
  • PublishedJanuary 2013
  • PublisherElsevier S & T
  • ISBN9780124095069

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.

Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

Format
Get it instantly

Zookal account needed

$23.95
Add Zookal Study FREE trial and save a further 10% 

NEW PRICE

$21.56 + free shipping

(10% off - save $2.40)

Zookal Study Free trial

14-day FREE trial. $14.95/mo after. Cancel anytime.

*Discount will apply at checkout.

 See terms and conditions

You will get a further 10% off for this item ($21.56 after discount) because you have added Zookal Study Premium Free Trial to your bag.

For this discount to apply, you will need to complete checkout with the Zookal Study Premium Free Trial in your bag.

-
+
  • Author(s) Brett Shavers
  • Edition1
  • PublishedJanuary 2013
  • PublisherElsevier S & T
  • ISBN9780124095069

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.

translation missing: en.general.search.loading