Presents information in forensic computing & IT security. This volume offers practical insight to security & its importance in design, implementation, & the maintenance of systems. It provides guidance on creating systems that allow data to be gathered for future investigation of an event.