ABSTRACT
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence o
TABLE OF CONTENTS
part |2 pages
SECTION I: CYBER FORENSICS
part |2 pages
SECTION II: FEDERAL AND INTERNATIONAL GUIDELINES
part |2 pages
SECTION III: FORENSICS TOOLS
part 18|2 pages
How to Report Internet-Related Crime