Summary: Presenting background information in computer and information systems and their use in the cyber environment, this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether it be from a network, an individual computer, a telephone, system, or personal electronic devices. More importantly, it covers the proper techniques and procedures for collecting and preserving computer evidence that will stand up in a court of law. ...show more The book includes checklists on how evidence should be handled and recommendations of best practices for reviewing policies by organizations and how often this should be done. ...show lessEdition/Copyright: 07
More prices and sellers below.