Skip to product information
1 of 1
Regular price £34.79 GBP
Regular price £43.99 GBP Sale price £34.79 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 10 days lead

Placing the Suspect Behind the Keyboard
Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Get the tools and investigative techniques you need to effectively manage a complete cybercrime case from inception to prosecution

Brett Shavers (Author)

9781597499859, Elsevier Science

Paperback / softback, published 2 April 2013

320 pages, 30 illustrations
23.5 x 19 x 2.1 cm, 0.59 kg

"The knowledge of the technologies and investigative procedures is broad, solid, and current. The claims are realistic and modest...the book makes a useful text for an introductory or refresher course in the investigation of cyber crimes..." --Computing Reviews, October 2014

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

Chapter 1. Introduction

Chapter 2. High Tech Interview

Chapter 3. Physical Investigations

Chapter 4. Technical Investigations

Chapter 5. Putting it all Together

Chapter 6. Investigative Case Management

Chapter 7. Case Presentation

Chapter 8. Cheat Sheets and Quickstart Guides

Chapter 9. Some Things will Become Easier, Others Not So Much

Chapter 10. Online Investigations

Chapter 11. Case Studies

Subject Areas: Computer security [UR], Forensic science [JKVF1]

View full details