Pt. I. Computer Forensics -- 1. Introduction -- 2. Relevance of Computer Forensics -- 3. Business and Administrative Issues -- 4. Where Incriminating Data Is Stored and How It Gets There -- 5. Specialized Forensics Techniques -- 6. Modes of Data Insertion and Acquisition -- 7. Fallacies of Protection -- Pt. II. Computer Privacy and Security -- 8. Protecting Against Unauthorized Snooping and Hostile Computer Forensics -- 9. Protection Proprietary and Other Confidential Information -- 10. Basic On-Line Computer Forensics -- 11. Intermediate On-Line Privacy -- 12. Advanced On-Line Privacy -- 13. Encryption: The Empire Versus the Rebels -- 14. Practical Encryption: Protecting Proprietary and Confidential Information Against Hostile Penetration -- Pt. III. Legal and Other Issues -- 15. Legal Issues -- 16. Security Aspects of Evolving Internet Technologies -- App. A. Providers of Computer Forensics and Training -- App. B. Ports Associated with Known Trojan Cyberthreats