* With a wide audience appeal, this book doesn't require that readers be computer experts in order to understand and apply what they've learned * Reviews computer forensics methods, software, tools, and equipment that are accepted by law enforcement, the FBI, the courts, and regulatory agencies * Discusses e-mail and Web-based forensics, mobile forensics, passwords and encryption, the various forms of e-evidence (VoIP, voicemail, legacy mainframes, databases), and more