جزییات کتاب
This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed throughout the book are included on a CD-ROM, which is included with the book. With the ready-made audit routines included in the appendix, the reader can immediately implement field audits. The step-by-step design allows the reader to gain comprehension of how the routines are developed, and how they can be applied in an audit/investigative situation.