Introduction. Purpose and scope -- Hard drive technology, file systems, and computer forensics -- Computer forensic techniques and sources of digital evidence -- Child pornography investigations -- Fourth amendment and computers -- Federal privacy statutes -- Conclusion.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.