IEEE 802.3, 717t
IEEE 802.11
IP network connections, 620
network setup, 750
OSI model, 622
“illegal access”. See Hacking
Illegal interception
as computer-integrity crime, 138–140
misuse of devices, 147
IM. See Instant Messaging (IM)
Immigration and Customs Enforcement (ICE), 342
Incident alert
digital investigation scaffolding, 197–198
security breach investigation, 221
Incident resolution process, 50f
Incident response, vs. computer intrusion investigation, 381
Independent component doctrine, hardware preservation, 476
In-depth forensic examination, definition, 213
Index entries, NTFS, 520
Indirect blocks, UNIX file systems, 555
Individual characteristics
creation, 495
examination step, 488–495 ...
Get Digital Evidence and Computer Crime, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.