Your email address will be used for Wildy’s marketing materials only. We will never give your email address to any third party.
Special Discounts for Pupils, Newly Called & Students
Browse Secondhand Online
Wildy's will be closed on Monday 1st May and will re-open on Tuesday 2nd May.
Online book orders received during the time we are closed will be processed as soon as possible once we re-open on Tuesday.
As usual Credit Cards will not be charged until the order is processed and ready to despatch.
Any non-UK eBook orders placed after 5pm on the Friday 28th April will not be processed until Tuesday 2nd May. UK eBook orders will be processed as normal.
The growth of computer automation has provided fraudsters, hackers and other criminals with new methods with which to commit forgery, impersonation, data manipulation, extortion, sabotage and theft. To the trained lawyer and investigator, however, computers, networks and other automated systems hold the clues and forensic evidence needed to incriminate wrongdoers. This text contains essential computer forensic principles and techniques applying to data retrieval and analysis where admissable evidence may need to be presented in a court of law. It explains the legal technicalities governing the admissability of computer evidence, and the conducting of such investigations, necessary for any lawyer presenting computer evidence in court.