Table of contents Chapter 1: Introduction: The Problem at Hand Chapter 2: "Computer Crime" discussed Chapter 3: Preparing for prosecution and testifying Chapter 4: Cyber Investigative Roles Chapter 5: Incident Response: live forensics and investigrations Chapter 6: Legal issues of intercepting WIFI transmissions Chapter 7: Seizure of digital information Chapter 8: Conducting Cyber Inv…