Introduction to Digital Forensics Introduction Structure Objectives Defining digital forensics Digital forensics goals Defining cybercrime Sources of cybercrime Computers in cybercrimes Digital forensics categories Computer forensics Mobile forensics Network forensics Database forensics Forensic data analysis Digital forensics users Law enforcement Civil ligation Intelligence and counterintelligence Digital forensics investigation types Forensics readiness Type of digital evidence User-created data Machine and network-created data Locations of electronic evidence Chain of custody Examination process Seizure Acquisition Analysis Reporting Conclusion Multiple choice questions/questions Learning Section Answers 2. I remember him posting a comment which he thinks tiny computer are less powerful(true to some extent).Table of contents : Cover Page Title Page Copyright Page Dedication Page About the Authors About the Reviewer Acknowledgement Preface Errata Table of Contents 1. Apparently he actually used that netbook to edit photo and do his work. My friend is a photographer but not much of a computer guy so he bought a netbook(yes, those 10-inches) and brought it to college. I have another one but it's not really non-techies. She would double click on the Google searches to open them too and I got really annoyed watching her using the computer at some point of my life. That includes links and buttons on the web browser. My mum isn't non-techy but she just double clicks on EVERYTHING she wants to open. If the shortcut on the desktop is gone, they would think all of their data on the computer are gone. Whenever something is wrong with the machine, they'll always ask if it's a virus or not. I used to work at a computer shop for IT support and service.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |