Items
Details
Table of Contents
Introduction. Purpose and s cope
Hard drive technology, file systems, and computer forensics
Computer forensic techniques and sources of digital evidence
Child pornography investigations
Fourth amendment and computers
Federal privacy statutes
Conclusion.
Hard drive technology, file systems, and computer forensics
Computer forensic techniques and sources of digital evidence
Child pornography investigations
Fourth amendment and computers
Federal privacy statutes
Conclusion.