Your email address will be used for Wildy’s marketing materials only. We will never give your email address to any third party.
Special Discounts for Newly Called & Students
Browse Secondhand Online
The growth of computer automation has provided fraudsters, hackers and other criminals with new methods with which to commit forgery, impersonation, data manipulation, extortion, sabotage and theft. To the trained lawyer and investigator, however, computers, networks and other automated systems hold the clues and forensic evidence needed to incriminate wrongdoers. This text contains essential computer forensic principles and techniques applying to data retrieval and analysis where admissable evidence may need to be presented in a court of law. It explains the legal technicalities governing the admissability of computer evidence, and the conducting of such investigations, necessary for any lawyer presenting computer evidence in court.