by
Mena, Jesus, author
Format:
Electronic Resources
Excerpt:
Computer crimes -- Investigations.
by
Learner, David E.
Format:
Electronic Resources
Excerpt:
) -- Glossary -- Investigations Involving the Internet and Computer Networks -- Summary -- Technical Working
View Other Search Results
by
White, Peter, 1949 Oct. 29-
Format:
Electronic Resources
Excerpt:
on computer based crimes and Bloodstain Pattern Analysis. Ideal for those studying forensic science
by
White, Peter C.
Format:
Electronic Resources
Excerpt:
requirements, the latest developments in DNA testing and two new chapters on computer based crimes and
by
Kävrestad, Joakim. author.
Format:
Electronic Resources
Excerpt:
nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into
by
Kizza, Joseph Migga. author.
Format:
Electronic Resources
Excerpt:
-- Computer Crimes -- New Frontiers For Computer Ethics Artificial Intelligence, Cyberspace, And Virtual
by
Kovacich, Gerald L.
Format:
Electronic Resources
Excerpt:
professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a
by
Kovacich, Gerald L.
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Table of contents only http://www.loc.gov/catdir/toc/ecip068/2006004111.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0632/2006004111-d.html
Table of contents only http://www.loc.gov/catdir/toc/ecip068/2006004111.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0632/2006004111-d.html
Format:
Electronic Resources
Excerpt:
Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology
by
Srinivasan, M. L.
Format:
Electronic Resources
Excerpt:
Investigations -- Knowledge requirements -- The approach -- Computer crimes -- Fraud -- Theft -- Malware or
by
Shipley, Todd G.
Format:
Electronic Resources
Excerpt:
-- Defining Internet crime -- Internet crime's prevalence -- CSI 2010/2011 Computer Crime and Security Survey
Limit Search Results