Email and Web mail Forensics
[Writer Name]
[Institute Name]
Table of contents
|1 |Introduction | |
|2 |Discussion | |
|3 |Computer virus | |
|4 |Antivirus programs | |
|5 |Email Investigation | |
| |a. Internet profiling | |
| |b. Online infidelity | |
| |c. Identification | |
| |d. Locate | |
|6 |Online risk assessment | |
|7 |Forensic Group | |
|8 |Identification and Extraction | |
|9 |Forensic analysis | |
|10 |Deleted Email
References: Lehtinen, Rick; (2006) Computer security basics, O 'Reilly Media, ISBN 0596006691. Peterson, Gilbert and Shenoi, Sujeet; (2009) Advances in Digital Forensics, Springer, ISBN 364204154X. Philipp, Aaron; (2009) Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions, McGraw Hill Professional, ISBN 0071626778. Shinder, Debra; (2008) Scene of the cybercrime, Syngress, ISBN 1597492760. Vacca, John; (2009) Computer and Information Security Handbook, Morgan Kaufmann, ISBN 0123743540. Wiles, Jack; (2007) Techno security 's guide to e-discovery and digital forensics, Elsevier, ISBN 159749223X. Bibliography Vacca, John; (2010) Managing Information Security, Syngress, ISBN-10: 1597495336.