Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details the scope of cyber forensics to reveal and track legal and illegal activity. The authors provide step-by-step instructions through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. The book covers rules of evidence, chain of custody, standard operating procedures, the manipulation of technology to conceal illegal activities, and how cyber forensics can uncover them. Extensive appendices include pertinent websites, organizations, and legislation.
Related Subjects
Business Business & Finance Business & Investing Business & Management Commerce Computer Science Computers Computers & Technology Criminal Law Criminal Procedure Criminology Culture Economics Encryption Forensic Science Hacking Law Law Enforcement Medical Medical Books Political Science Politics & Government Reference Security & Encryption Social Sciences Textbooks