Cargando…
Placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Syngress
2013
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1622811 |
_version_ | 1780933315041165312 |
---|---|
author | Shavers, Brett |
author_facet | Shavers, Brett |
author_sort | Shavers, Brett |
collection | CERN |
id | cern-1622811 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
publisher | Syngress |
record_format | invenio |
spelling | cern-16228112021-04-21T21:49:11Zhttp://cds.cern.ch/record/1622811engShavers, BrettPlacing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspectsComputing and ComputersSyngressoai:cds.cern.ch:16228112013 |
spellingShingle | Computing and Computers Shavers, Brett Placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects |
title | Placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects |
title_full | Placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects |
title_fullStr | Placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects |
title_full_unstemmed | Placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects |
title_short | Placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects |
title_sort | placing the suspect behind the keyboard: using digital forensics and investigative techniques to identify cybercrime suspects |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1622811 |
work_keys_str_mv | AT shaversbrett placingthesuspectbehindthekeyboardusingdigitalforensicsandinvestigativetechniquestoidentifycybercrimesuspects |