Đang tải... (xem toàn văn)
Ngày đăng: 25/03/2014, 11:15
Xem thêm: forensic computer crime investigation, I. Introduction and Historical Developments, E. Electronic Crime Scene Procedures, B. Searching and Seizing Computers with a Warrant, F. Recruitment, Hiring, and Retention, IV. Review of the Literature, D. Behavioral Assessment of the Crime Scene, XII. The Future of Cyberprofiling, VI. Gathering Intelligence about the Case, VI. Determining the Critical Success Factors for a Case, X. Processing: Critical Evidence Recovery from Electronic Media, XV. Exhibits, Reports, and Findings, IV. Specialized or Update Training, II. Computer-Assisted and Internet Crimes Against Children, E. The Nature of Some Legal Systems and Refuting Challenges, G. Selective Collection and Presentation, C. Wiretap Limitations and Title 3, C. Principles of Best Practices, L. Good Practice in Analysis, B. Difficulties in Backtracing Onion Router Traffic, III. Planning an International Backtracing Procedure: Technical and Operational Aspects, A. Some Commonly Used Tools in Digital and Network Forensics, A. Deploying Honeynet: Background and Implications, V. An Example of International Cooperation: Operation Root Kit, I. Policy Issues Regarding Cyber Terrorism, A. Protection of Critical Infrastructure Sectors, VI. Research Issues in Cyber Terrorism, III. The Emergence of a New Academic Discipline, IV. Our Nation's Investment in Cyber Security Research