Cyber crime secrets

"Presents different ways cyber crime is committed and the many ways electronic equipment can be used to solve crimes. Includes case files and case studies from real cyber crime situations"--Provided by publisher.

amicus
2012
9781607531685
book

Holdings

hidmidmiidnidwidlocation_codelocationbarcodecallnumdeweycreatedupdated
383304420732522612682150891ELBA170ELB86363.25 TOW363.2515774597521709567815
1298754496620123162682150891PEBT367PEBT52312363.259 TOW363.2515814652241736518457
2027897560630822292682150891GROL244GRAP204524363.259 TOW363.2515825759371709307855
2093299566192122332682150891HIMW256HIMW054470363.25 TOW363.2515825759371709307855
2467280598724524172682150891ROES400RME0093233364.16 TOW364.1616377825731736800991
2785029627230923862682150891GEI228GVN0024926363.25 TOW363.2516377825731736800991