Examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. This book presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to identify, retrieve, and protect valuable forensic evidence for prosecution.