As society has become increasingly reliant on computers for document creation and information storage and transmittal, the amount of unauthorized theft of sensitive information stored in computers has increased correspondingly. This cutting-edge new book delivers a comprehensive treatment of the emerging field of computer forensics, making it a valuable resource for IT professionals in private businesses and government organizations, lawyers and law enforcement professionals, as well as the typical user of personal ...
Read More
As society has become increasingly reliant on computers for document creation and information storage and transmittal, the amount of unauthorized theft of sensitive information stored in computers has increased correspondingly. This cutting-edge new book delivers a comprehensive treatment of the emerging field of computer forensics, making it a valuable resource for IT professionals in private businesses and government organizations, lawyers and law enforcement professionals, as well as the typical user of personal computers. It identifies the specific areas where sensitive and potentially incriminating data is hiding in personal computers, and explains how to go about truly removing this data. The book provides a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one's computer.
Read Less