Text
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors
Table of contents
Chapter 1: Introduction: The Problem at Hand
Chapter 2: "Computer Crime" discussed
Chapter 3: Preparing for prosecution and testifying
Chapter 4: Cyber Investigative Roles
Chapter 5: Incident Response: live forensics and investigrations
Chapter 6: Legal issues of intercepting WIFI transmissions
Chapter 7: Seizure of digital information
Chapter 8: Conducting Cyber Investigations
Chapter 9: Computer Forensics and Analyzing Data
Chapter 10: Cyber crime prevention
Appendix A: Legal principles for information security evaluations
Appendix B: Investigating insider threat using enterprise security management
No other version available