Presenting background information in computer and information systems and their use in the cyber environment,
this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether
it be from a network, an individual computer, a telephone, system, or personal electronic devices. More importantly,
it covers the proper techniques and procedures for collecting and preserving computer evidence that will stand
up in a court of law. The book includes checklists on how evidence should be handled and recommendations of best
practices for reviewing policies by organizations and how often this should be done.