April 2011
Beginner
432 pages
10h 34m
English
Table of Contents
Instructions for online access
Lead Author and Technical Editor
Chapter 1: The Problem at Hand
Chapter 2: “Computer Crime” Discussed
Chapter 3: Preparing for Prosecution and Testifying
Chapter 4: Cyber Investigative Roles
Chapter 6: Legal Issues of Intercepting WiFi Transmissions
Chapter 7: Seizure of Digital Information
Chapter 8: Conducting Cyber Investigations
Chapter 9: Digital Forensics and Analyzing Data
Chapter 10: Cyber Crime Prevention
Appendix A: Legal Principles for Information Security Evaluations
Appendix B: Investigating Insider Threat Using Enterprise Security Management
Read now
Unlock full access