Loading...
Table of Contents:
  • Entering the world of cybercrime
  • An introduction to computer forensics investigations and electronic evidence
  • Laws regulating access to electronic evidence
  • Searches and seizures of computers and electronic evidence
  • Cybercrime laws : which statute for which crime?
  • Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators!
  • Where is the electronic evidence and which tools can we use to find it?
  • Crime and incident scene : what should an investigator do?
  • Corporate crimes and policy violations involving computers : how to conduct a corporate investigation
  • E-mail forensics
  • Network forensics : an introduction
  • Mobile phones and pdas in computer forensics investigations
  • The pretrial and courtroom experiences of a computer forensics investigator.