Abstract
Learning Objectives
After reading this chapter, the reader should be able to:
-
1.
Understand the science of digital crime investigation.
-
2.
Understand the fundamental steps in digital crime investigation.
-
3.
Understand digital evidence.
-
4.
Learn to handle digital evidence.
-
5.
Acquire the techniques required in digital crime investigation.
-
6.
Recognize the difficulties encountered during digital crime investigation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kruse II, Warren and Jay G. Heiser. Computer Forensics: Incident Response Essentials. Boston, MA: Addison-Wesley, 2002.
Nelson, Bill, Amelia Phillips, Frank Enfinger, and Chis Steuart. Guide to Computer Forensics and Investigations (2nd ed.). Boston, MA: Course Technology, 2006.
Sammes, Tony and Brian Jenkinson. Forensic Computing: A Practitioner’s Guide. London: Springer, 2000.
Volonino, Linda, Reynaldo Anzaldua, and Jana Godwin. Computer Forensics: Principles and Practices. Upper Saddle River, NJ: Prentice Hall, 2007, p. 13.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag London Limited
About this chapter
Cite this chapter
Kizza, J.M. (2010). Computer Crime Investigations – Computer Forensics. In: Ethical and Social Issues in the Information Age. Texts in Computer Science. Springer, London. https://doi.org/10.1007/978-1-84996-038-0_13
Download citation
DOI: https://doi.org/10.1007/978-1-84996-038-0_13
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84996-037-3
Online ISBN: 978-1-84996-038-0
eBook Packages: Computer ScienceComputer Science (R0)