Suitable for IT security professionals and members of law enforcement, this book describes some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them.