O'Reilly logo

Cyber Crime Investigations by James Steele, Kevin O'Shea, Richard Brittson, Anthony Reyes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

A

Absolute immunity, 8384
Access points
description of, 113, 128
encryption schemes used with, 116
ACFE. See Association of Certified Fraud Examiners
Admissibility of evidence, 5255, 180, 225
“Agent of the government,” 7678, 87
American Academy of Forensic Sciences, 3
American Management Association, 73
Analysis phase, of digital forensics
binary analysis, 248
challenges, 245
data carving, 250
deleted items, 249
description of, 223, 244245
e-mail analysis, 250
enterprise events, 251252
example of, 245
exchangeable image file format, 248
flow charts, 251252
metadata, 247
single-computer analysis, 247250
timelines, 252
tools used in, 253255
Andersen Consulting LLP v. UOP, 122
Anti-forensics, 246247
Anti-spyware software, 272273 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required