Presenting background information in computer and information systems and their use in the cyber environment, this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether it is from a network, an individual computer, a telephone system, or personal electronic device. More importantly, it covers the proper techniques and procedures for collecting and preserving computer evidence that will stand up in a court of law. The book includes checklists on how evidence should be handled and recommends policies for organizations to adopt to protect themselves from malfeasance.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.