Index
A
Access points
encryption schemes used with, 116
ACFE. See Association of Certified Fraud Examiners
American Academy of Forensic Sciences, 3
American Management Association, 73
Analysis phase, of digital forensics
binary analysis, 248
challenges, 245
data carving, 250
deleted items, 249
e-mail analysis, 250
example of, 245
exchangeable image file format, 248
metadata, 247
timelines, 252
Andersen Consulting LLP v. UOP, 122
Get Cyber Crime Investigations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.