Index
Access controls
Accounting, forensic
Actuators
Air travel
Anonymous identities, revealing
Application data
Apps
Attorneys
Audio files
Backup systems
BIOS (basic input output system)
Bots and botnets
Boundary scans
Broadband routers
Cars, transporting evidence by
Case management
Cellular phones
Central processing unit (CPU)
Certification
Chain of custody
Chat, online
China
Clients
Cloud computing
Cognitive computing
Collection phase
Colocation facilities (colos)
Computer abuse
Computer-assisted review
Computer crime analysis and reconstruction
Computer forensic examiners
Computer forensic laboratories
establishment
evidence and access controls
staffing
teamwork and workflow
tools
workstations
Computer forensics, defined
Computer monitoring software
Computers, types of
Concept searching (machine-assisted review)
Connectors
Contracts
Cyber investigators
Cyberprofiling
Data acquisition forms
Data- and traffic-gathering applications
Database management system (DBMS)
Databases
Data breaches
Data centers
Data classification
Data collection
Data concealment
Data hosting and review
Data identification
Data maps
Data preservation
Data privacy experts
Data processing, analysis, and analytics
Data reviewers
Data storage
DDoS (distributed denial-of-service) attacks
Defense attorneys
Deleted data
Demilitarized zone (DMZ)
Detail, attention to
Digital evidence
characteristics of
control over
seizure and examination
storage and transportation
Document usage data
Domain name
Drills
Dynamic ...
Get Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.