Designed as a field guide, this book describes how to investigate a computer crime from soup to nuts, covering everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. The author discusses the