What do you think?
Rate this book


KEY FEATURES
- Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods and services
- Discusses data seizure and analysis, preservation of computer evidence, reconstruction of events and information warfare
- Case studies and vignettes of actual computer crimes are used
- CD includes demos of the latest computer forensics and auditing software
Author Biography: John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.
600 pages, Paperback
First published June 15, 2002