February 2026
Intermediate to advanced
456 pages
17h 3m
English
This chapter examined the various ways in which the nature of a computer crime can affect the process of forensically investigating the crime. It is imperative that you be aware of the different crimes and how to investigate them. For example, seeking email evidence would be useful for investigating cyberstalking, but would not be useful for most DoS attacks. It is important that forensic investigators have a working knowledge of how these attacks are committed in order to properly investigate them.
Read now
Unlock full access