Chapter 4

Technical Investigations

Information in this chapter

ent Digital investigative techniques

ent Who? What? When? Why? Where? and How?

ent “Other” device forensics

ent Online social networking

ent User activity

 Digital authorship

 Profiling

 Biological forensic ...

Get Placing the Suspect Behind the Keyboard now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.