Find a copy in the library
Finding libraries that hold this item...
|All Authors / Contributors:||
|Description:||xi, 236 pages : illustrations ; 24 cm|
|Contents:||Computer fraud and misuse. Password compromise and deception. A guide to investigative methods. Computers, evidence and the law. Backups and the continuity of evidence. The forensic examination of personal computers. Multiple text search - the investigator's 'A' bomb. Investigating anonymous letters and computer generated documents.|
|Responsibility:||by Edward Wilding.|