High-technology crime investigator's handbook: establishing and managing a high-technology crime prevention program
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Butterworth-Heinemann/Elsevier
c2006
|
Ausgabe: | 2nd ed |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- - Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- - Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxvii, 470 p.) |
ISBN: | 0080468209 0750679298 9780080468204 9780750679299 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043044723 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2006 |||| o||u| ||||||eng d | ||
020 | |a 0080468209 |c electronic bk. |9 0-08-046820-9 | ||
020 | |a 0750679298 |9 0-7506-7929-8 | ||
020 | |a 9780080468204 |c electronic bk. |9 978-0-08-046820-4 | ||
020 | |a 9780750679299 |9 978-0-7506-7929-9 | ||
035 | |a (OCoLC)162593811 | ||
035 | |a (DE-599)BVBBV043044723 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.25/968 |2 22 | |
100 | 1 | |a Kovacich, Gerald L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a High-technology crime investigator's handbook |b establishing and managing a high-technology crime prevention program |c Gerald L. Kovacich and Andy Jones |
250 | |a 2nd ed | ||
264 | 1 | |a Amsterdam |b Butterworth-Heinemann/Elsevier |c c2006 | |
300 | |a 1 Online-Ressource (xxvii, 470 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers | ||
500 | |a SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- | ||
500 | |a - Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- | ||
500 | |a - Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a LAW / Forensic Science |2 bisacsh | |
650 | 7 | |a Criminal investigation |2 fast | |
650 | 7 | |a High technology |2 fast | |
650 | 4 | |a Criminal investigation | |
650 | 4 | |a High technology | |
700 | 1 | |a Jones, Andy |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187426 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469260 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187426 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187426 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175410830770176 |
---|---|
any_adam_object | |
author | Kovacich, Gerald L. |
author_facet | Kovacich, Gerald L. |
author_role | aut |
author_sort | Kovacich, Gerald L. |
author_variant | g l k gl glk |
building | Verbundindex |
bvnumber | BV043044723 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)162593811 (DE-599)BVBBV043044723 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05532nmm a2200493zc 4500</leader><controlfield tag="001">BV043044723</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080468209</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-046820-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750679298</subfield><subfield code="9">0-7506-7929-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080468204</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-046820-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750679299</subfield><subfield code="9">978-0-7506-7929-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162593811</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043044723</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kovacich, Gerald L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">High-technology crime investigator's handbook</subfield><subfield code="b">establishing and managing a high-technology crime prevention program</subfield><subfield code="c">Gerald L. Kovacich and Andy Jones</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Butterworth-Heinemann/Elsevier</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 470 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Forensic Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">High technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminal investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">High technology</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jones, Andy</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187426</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469260</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187426</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187426</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043044723 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:51Z |
institution | BVB |
isbn | 0080468209 0750679298 9780080468204 9780750679299 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469260 |
oclc_num | 162593811 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxvii, 470 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Butterworth-Heinemann/Elsevier |
record_format | marc |
spelling | Kovacich, Gerald L. Verfasser aut High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program Gerald L. Kovacich and Andy Jones 2nd ed Amsterdam Butterworth-Heinemann/Elsevier c2006 1 Online-Ressource (xxvii, 470 p.) txt rdacontent c rdamedia cr rdacarrier The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- - Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- - Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts Includes bibliographical references and index LAW / Forensic Science bisacsh Criminal investigation fast High technology fast Criminal investigation High technology Jones, Andy Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187426 Aggregator Volltext |
spellingShingle | Kovacich, Gerald L. High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program LAW / Forensic Science bisacsh Criminal investigation fast High technology fast Criminal investigation High technology |
title | High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program |
title_auth | High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program |
title_exact_search | High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program |
title_full | High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program Gerald L. Kovacich and Andy Jones |
title_fullStr | High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program Gerald L. Kovacich and Andy Jones |
title_full_unstemmed | High-technology crime investigator's handbook establishing and managing a high-technology crime prevention program Gerald L. Kovacich and Andy Jones |
title_short | High-technology crime investigator's handbook |
title_sort | high technology crime investigator s handbook establishing and managing a high technology crime prevention program |
title_sub | establishing and managing a high-technology crime prevention program |
topic | LAW / Forensic Science bisacsh Criminal investigation fast High technology fast Criminal investigation High technology |
topic_facet | LAW / Forensic Science Criminal investigation High technology |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187426 |
work_keys_str_mv | AT kovacichgeraldl hightechnologycrimeinvestigatorshandbookestablishingandmanagingahightechnologycrimepreventionprogram AT jonesandy hightechnologycrimeinvestigatorshandbookestablishingandmanagingahightechnologycrimepreventionprogram |