Index

Access controls

Accounting, forensic

Actuators

Air travel

Anonymous identities, revealing

Application data

Apps

Attorneys

Audio files

Backup systems

BIOS (basic input output system)

Bots and botnets

Boundary scans

Broadband routers

Cars, transporting evidence by

Case management

Cellular phones

Central processing unit (CPU)

Certification

Chain of custody

Chat, online

China

Clients

Cloud computing

Cognitive computing

Collection phase

Colocation facilities (colos)

Computer abuse

Computer-assisted review

Computer crime analysis and reconstruction

Computer forensic examiners

Computer forensic laboratories

establishment

evidence and access controls

staffing

teamwork and workflow

tools

workstations

Computer forensics, defined

Computer monitoring software

Computers, types of

Concept searching (machine-assisted review)

Connectors

Contracts

Cyber investigators

Cyberprofiling

Data acquisition forms

Data- and traffic-gathering applications

Database management system (DBMS)

Databases

Data breaches

Data centers

Data classification

Data collection

Data concealment

Data hosting and review

Data identification

Data maps

Data preservation

Data privacy experts

Data processing, analysis, and analytics

Data reviewers

Data storage

DDoS (distributed denial-of-service) attacks

Defense attorneys

Deleted data

Demilitarized zone (DMZ)

Detail, attention to

Digital evidence

characteristics of

control over

seizure and examination

storage and transportation

Document usage data

Domain name

Drills

Dynamic ...

Get Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.