We are now closed for the Christmas and New Year period, reopening on Friday 3rd January 2025. Orders placed during this time will be processed upon our return on 3rd January.
The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.
For further information see https://www.wildy.com/ebook-formats
Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.
All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets.
Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks.
They can cause immense harm to individuals or businesses online and make large sums of money - safe in the knowledge that the victim will rarely report the matter to the police. For those tasked with probing such crimes in the field, information on investigative methodology is scarce.
The Cybercrime Investigators Handbook is an innovative guide that approaches cybercrime investigation from the field-practitioner's perspective. While there are high-quality manuals for conducting digital examinations on a device or network that has been hacked.
The Cybercrime Investigators Handbook is the first guide on how to commence an investigation from the location the offence occurred - the scene of the cybercrime - and collect the evidence necessary to locate and prosecute the offender. This valuable contribution to the field teaches readers to: