O'Reilly logo

Digital Evidence and Computer Crime, 3rd Edition by Eoghan Casey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IEEE 802.3, 717t
IEEE 802.11
basic technology, 616–617, 616f
IP network connections, 620
network setup, 750
OSI model, 622
“illegal access”. See Hacking
Illegal interception
as computer-integrity crime, 138–140
misuse of devices, 147
Immigration and Customs Enforcement (ICE), 342
Incident alert
digital investigation scaffolding, 197–198
security breach investigation, 221
Incident resolution process, 50f
Incident response, vs. computer intrusion investigation, 381
Independent component doctrine, hardware preservation, 476
In-depth forensic examination, definition, 213
Index entries, NTFS, 520
Indirect blocks, UNIX file systems, 555
Individual characteristics
creation, 495
evidence, 17, 18
examination step, 488–495 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required