The complex world of corporate cyberforensics investigations -- Investigating large-scale data breach cases -- Insider threat investigations -- Accounting forensics -- Analyzing malicious software -- Network packet forensics -- RAM and file systems investigations -- One picture is worth a million bytes -- Cybercrime and law enforcement cooperation -- Technology malpractice.
0
This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grab.