KEY CONCEPTS AND TERMS

Chain of custody

Code analysis

Computer forensics

Digital evidence

Forensic duplicate image

Fruit of the poisonous tree doctrine

Hearsay

Locard’s exchange principle

Media analysis

Network analysis

Network banner

Objection

Pen register devices

Persistent data

Probative evidence

Trap and trace devices

Volatile data

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.244.201