ABSTRACT

Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence o

part |2 pages

SECTION II: FEDERAL AND INTERNATIONAL GUIDELINES

chapter 9|26 pages

Computer Crime Policy and Programs

chapter 10|16 pages

International Aspects of Computer Crime

chapter 11|6 pages

Privacy Issues in the High-Tech Context

chapter 12|22 pages

Critical Infrstructure Protection

chapter 13|38 pages

Electronic Commerce: Legal Issues

chapter 15|26 pages

Encryption

chapter 16|12 pages

Intellectual Property

part |2 pages

SECTION III: FORENSICS TOOLS

chapter 17|14 pages

Forensic and Security Assessment Tools

part 18|2 pages

How to Report Internet-Related Crime

chapter |2 pages

APPENDICES: IV