Description:How would your organization cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organization. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required.