ChapterChapter 1 Entering the World of Cybercrime ChapterChapter 2 An Introduction to Computer Forensics Investigations and Electronic Evidence ChapterChapter 3 Laws Regulating Access to Electronic Evidence ChapterChapter 4 Searches and Seizures of Computers and Electronic Evidence ChapterChapter 5 Cybercrime Laws: Which Statute for Which Crime? ChapterChapter 6 Understanding the Computer-Networking Environment: Beware of the Scam Artists, Bullies, and Lurking Predators! ChapterChapter 7 Political Cybercrime: The Case of Cyberterrorism ChapterChapter 8 Where Is the Electronic Evidence and Which Tools Can We Use to Find It? ChapterChapter 9 Crime and Incident Scene: What Should an Investigator Do? ChapterChapter 10 Corporate Crimes and Policy Violations Involving Computers: How to Conduct a Corporate Investigation ChapterChapter 11 E-mail Forensics ChapterChapter 12 Network Forensics: An Introduction ChapterChapter 13 Mobile Devices in Computer Forensics Investigations ChapterChapter 14 The Pretrial and Courtroom Experiences of a Computer Forensics Investigator
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.