Index
A
abuse of omniscience
access controls
chain of custody
data access
encrypted data
network
physical
AccessData Certified Examiner (ACE) certification
AccessData Mobile Phone Examiner (MPE)
ACE (AccessData Certified Examiner) certification
active data
AD1 format
AD1 images
adapters
administrator abuse cases
abuse of omniscience
beginning an investigation
challenges
considerations
criminal prosecution
defined
establishing criteria
evidence
examples of
exploiting insider knowledge
goals of
network credentials
overview
running pornographic site
scenarios
security appliances
termination
theft. See theft
using company resources
work product
admissibility
Advanced Forensics Format (AFF)
AFF (Advanced Forensics Format)
affidavits
agent of the court ...

Get Computer Forensics InfoSec Pro Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.