ABSTRACT

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to inve

chapter 1|4 pages

The Initial Contact

chapter 2|4 pages

Client Site Arrival

chapter 3|8 pages

Evidence Collection Procedures

chapter 4|42 pages

Evidence Collection and Analysis Tools

chapter 5|20 pages

AccessData's Forensic Tool Kit

chapter 6|40 pages

Guidance Software's EnCase

chapter 7|20 pages

ILook Investigator

chapter 8|4 pages

Password Recovery

chapter 9|20 pages

Questions and Answers by Subject Area

chapter 10|6 pages

0 Recommended Reference Materials

chapter 11|34 pages

1 Case Study