132,38 €
147,09 €
-10% with code: EXTRA
Hiding Behind the Keyboard
Hiding Behind the Keyboard
132,38
147,09 €
  • We will send in 10–14 business days.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book of…
147.09
  • SAVE -10% with code: EXTRA

Hiding Behind the Keyboard (e-book) (used book) | bookbook.eu

Reviews

(4.17 Goodreads rating)

Description

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

EXTRA 10 % discount with code: EXTRA

132,38
147,09 €
We will send in 10–14 business days.

The promotion ends in 22d.23:43:43

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,47 Book Euros!?
  • Author: Brett Shavers
  • Publisher:
  • ISBN-10: 0128033401
  • ISBN-13: 9780128033401
  • Format: 19.1 x 23.5 x 1.4 cm, minkšti viršeliai
  • Language: English English

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)