Text
Scene of the cybercrime
Table of Contents
1. Facing the Cybercrime Problem Head-on
2. Emerging Cybercrime Techniques
3. Understanding the People on the Scene
4. The Computer Investigation Process
5. Acquiring Data, Duplicating Data, and Recovering Deleted Files
6. Understanding Network Intrusions and Attacks
7. Understanding Cybercrime Prevention
8. Implementing Cybercrime Detection Techniques
9. Collecting and Preserving Digital Evidence
10. Analyzing Windows Systems
11. Analyzing Linux Systems
12. Investigating UNIX Systems
13. Achieving Compliance with Federal Regulations
14. Building the Cybercrime Case
15. Worldwide Forensics Acts and Laws
No other version available