Reveals the secrets & strategies for investigating computer crime in the Hacking Exposed format. This title offers information on crucial procedures to successfully prosecute violators while avoiding the pitfalls of illicit searches, privacy violations, & illegally obtained evidence.