The investigator's guide to computer crime /:
With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investiga...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Springfield, Ill. :
Charles C. Thomas,
©2006.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. |
Beschreibung: | 1 online resource (xv, 312 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780398084585 0398084580 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn689996291 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 101206s2006 ilua obf 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d N$T |d OCLCQ |d DEBSZ |d OCLCF |d OCLCQ |d E7B |d YDXCP |d OCLCQ |d OCL |d OCLCQ |d AGLDB |d OCLCQ |d VTS |d STF |d M8D |d OCLCQ |d UKSSU |d VLY |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1162394632 |a 1241886959 |a 1244842628 | ||
020 | |a 9780398084585 |q (electronic bk.) | ||
020 | |a 0398084580 |q (electronic bk.) | ||
020 | |z 0398076014 | ||
020 | |z 9780398076016 | ||
020 | |z 0398076022 |q (pbk.) | ||
020 | |z 9780398076023 |q (pbk.) | ||
035 | |a (OCoLC)689996291 |z (OCoLC)1162394632 |z (OCoLC)1241886959 |z (OCoLC)1244842628 | ||
050 | 4 | |a HV8079.C65 |b F73 2006 | |
072 | 7 | |a LAW |x 041000 |2 bisacsh | |
082 | 7 | |a 363.25/968 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Franklin, Carl J., |d 1958- |1 https://id.oclc.org/worldcat/entity/E39PCjF3QCBxfWxQFdXTTxhbVC |0 http://id.loc.gov/authorities/names/n2005043682 | |
245 | 1 | 4 | |a The investigator's guide to computer crime / |c by Carl J. Franklin. |
260 | |a Springfield, Ill. : |b Charles C. Thomas, |c ©2006. | ||
300 | |a 1 online resource (xv, 312 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary. | |
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer crimes |x Investigation |v Handbooks, manuals, etc. | |
650 | 6 | |a Criminalité informatique |x Enquêtes |v Guides, manuels, etc. | |
650 | 7 | |a LAW |x Forensic Science. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
655 | 7 | |a handbooks. |2 aat | |
655 | 7 | |a Handbooks and manuals |2 fast | |
655 | 7 | |a Handbooks and manuals. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026109 | |
655 | 7 | |a Guides et manuels. |2 rvmgf | |
758 | |i has work: |a The investigator's guide to computer crime (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGbkvw6rpP9mKkkB9Qxr9C |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Franklin, Carl J., 1958- |t Investigator's guide to computer crime. |d Springfield, Ill. : Charles C. Thomas, ©2006 |z 0398076014 |w (DLC) 2005050873 |w (OCoLC)60705753 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=452683 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL564174 | ||
938 | |a ebrary |b EBRY |n ebr11030676 | ||
938 | |a EBSCOhost |b EBSC |n 452683 | ||
938 | |a Internet Archive |b INAR |n investigatorsgui0000fran | ||
938 | |a YBP Library Services |b YANK |n 3543254 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn689996291 |
---|---|
_version_ | 1816881746665275392 |
adam_text | |
any_adam_object | |
author | Franklin, Carl J., 1958- |
author_GND | http://id.loc.gov/authorities/names/n2005043682 |
author_facet | Franklin, Carl J., 1958- |
author_role | |
author_sort | Franklin, Carl J., 1958- |
author_variant | c j f cj cjf |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 F73 2006 |
callnumber-search | HV8079.C65 F73 2006 |
callnumber-sort | HV 48079 C65 F73 42006 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary. |
ctrlnum | (OCoLC)689996291 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04180cam a2200613 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn689996291</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">101206s2006 ilua obf 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKSSU</subfield><subfield code="d">VLY</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1162394632</subfield><subfield code="a">1241886959</subfield><subfield code="a">1244842628</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780398084585</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0398084580</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0398076014</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780398076016</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0398076022</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780398076023</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)689996291</subfield><subfield code="z">(OCoLC)1162394632</subfield><subfield code="z">(OCoLC)1241886959</subfield><subfield code="z">(OCoLC)1244842628</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">F73 2006</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">041000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Franklin, Carl J.,</subfield><subfield code="d">1958-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjF3QCBxfWxQFdXTTxhbVC</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2005043682</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The investigator's guide to computer crime /</subfield><subfield code="c">by Carl J. Franklin.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Springfield, Ill. :</subfield><subfield code="b">Charles C. Thomas,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 312 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Enquêtes</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Forensic Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">handbooks.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026109</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Guides et manuels.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The investigator's guide to computer crime (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGbkvw6rpP9mKkkB9Qxr9C</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Franklin, Carl J., 1958-</subfield><subfield code="t">Investigator's guide to computer crime.</subfield><subfield code="d">Springfield, Ill. : Charles C. Thomas, ©2006</subfield><subfield code="z">0398076014</subfield><subfield code="w">(DLC) 2005050873</subfield><subfield code="w">(OCoLC)60705753</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=452683</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL564174</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr11030676</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">452683</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">investigatorsgui0000fran</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3543254</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | handbooks. aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf |
genre_facet | handbooks. Handbooks and manuals Handbooks and manuals. Guides et manuels. |
id | ZDB-4-EBA-ocn689996291 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:37Z |
institution | BVB |
isbn | 9780398084585 0398084580 |
language | English |
oclc_num | 689996291 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xv, 312 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Charles C. Thomas, |
record_format | marc |
spelling | Franklin, Carl J., 1958- https://id.oclc.org/worldcat/entity/E39PCjF3QCBxfWxQFdXTTxhbVC http://id.loc.gov/authorities/names/n2005043682 The investigator's guide to computer crime / by Carl J. Franklin. Springfield, Ill. : Charles C. Thomas, ©2006. 1 online resource (xv, 312 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. Includes bibliographical references and index. SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary. Print version record. English. Computer crimes Investigation Handbooks, manuals, etc. Criminalité informatique Enquêtes Guides, manuels, etc. LAW Forensic Science. bisacsh Computer crimes Investigation fast handbooks. aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf has work: The investigator's guide to computer crime (Text) https://id.oclc.org/worldcat/entity/E39PCGbkvw6rpP9mKkkB9Qxr9C https://id.oclc.org/worldcat/ontology/hasWork Print version: Franklin, Carl J., 1958- Investigator's guide to computer crime. Springfield, Ill. : Charles C. Thomas, ©2006 0398076014 (DLC) 2005050873 (OCoLC)60705753 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=452683 Volltext |
spellingShingle | Franklin, Carl J., 1958- The investigator's guide to computer crime / SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary. Computer crimes Investigation Handbooks, manuals, etc. Criminalité informatique Enquêtes Guides, manuels, etc. LAW Forensic Science. bisacsh Computer crimes Investigation fast |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026109 |
title | The investigator's guide to computer crime / |
title_auth | The investigator's guide to computer crime / |
title_exact_search | The investigator's guide to computer crime / |
title_full | The investigator's guide to computer crime / by Carl J. Franklin. |
title_fullStr | The investigator's guide to computer crime / by Carl J. Franklin. |
title_full_unstemmed | The investigator's guide to computer crime / by Carl J. Franklin. |
title_short | The investigator's guide to computer crime / |
title_sort | investigator s guide to computer crime |
topic | Computer crimes Investigation Handbooks, manuals, etc. Criminalité informatique Enquêtes Guides, manuels, etc. LAW Forensic Science. bisacsh Computer crimes Investigation fast |
topic_facet | Computer crimes Investigation Handbooks, manuals, etc. Criminalité informatique Enquêtes Guides, manuels, etc. LAW Forensic Science. Computer crimes Investigation handbooks. Handbooks and manuals Handbooks and manuals. Guides et manuels. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=452683 |
work_keys_str_mv | AT franklincarlj theinvestigatorsguidetocomputercrime AT franklincarlj investigatorsguidetocomputercrime |