Abstract
Throughout this book you will find that we have consistently referred to the term “Forensic Computing” for what is often elsewhere called “Computer Forensics”. In the UK, however, this latter name has been adopted by a commercial company operating in the forensic computing field and we felt that it was not appropriate for us to use a name that carried with it commercial connotations. Hence our use of “Forensic Computing”. Having said that, however, we will need on occasion to refer to “Computer Forensics” particularly when quoting from overseas journals and papers which use the term and our use in such circumstances should then be taken as synonymous with that of “Forensic Computing” and not as a reference to the commercial company.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ACPO (1999) Good Practice Guide for Computer Based Evidence V2.00, The Association of Chief Police Officers (ACPO) Computer Crime Group.
Pollitt, Mark M. (undated) Computer Forensics: An Approach to Evidence in Cyberspace, Federal Bureau of Investigation, Baltimore, MD.
Pollitt, Mark M. (1995) Principles, practices, and procedures: an approach to standards in computer forensics, Second International Conference on Computer Evidence, Baltimore, MD, 10–15 April 1995. Federal Bureau of Investigation, Baltimore, MD.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag London
About this chapter
Cite this chapter
Sammes, A.J., Jenkinson, B.L. (2000). Forensic Computing. In: Forensic Computing. Practitioner Series. Springer, London. https://doi.org/10.1007/978-1-4471-3661-3_1
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3661-3_1
Publisher Name: Springer, London
Print ISBN: 978-1-85233-299-0
Online ISBN: 978-1-4471-3661-3
eBook Packages: Springer Book Archive