Subject Index

Note: Page numbers followed by f indicates a figure and t indicates a table.

10Base5 Ethernet, 714, 716t
10BaseT Ethernet, 715, 715f, 716t, 723
100BaseT Ethernet, 715, 716t, 723
1000BaseT Ethernet, 715, 716t

A

Abuse phase, computer intrusions, 372, 373t
Access Control Lists (ACLs), 519, 545
Access crimes, state cybercrime law, 103–105
Access points (APs)
IEEE 802.11, 616
MAC address sources, 725
network setup, 750
wireless network example, 616f
Accuracy
and admissibility, 61
best evidence, 64
business records, 68
and certainty, 68
dates and times, 522
evidence reliability, 61
forensic examination, 215
hypothesis formation/evaluation, 203
preconceived theories, 54
preservation, ...

Get Digital Evidence and Computer Crime, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.