Up until about a decade ago, documentary evidence was mostly on paper. Even computer evidence amounted to reams of printed pages. This is no longer the case. The electronic version of a file that was created by and/or stored in a computer can be far more damaging to an individual or to an organization because it contains not only the documentary evidence itself but also “data about the data” (such as when it was created, when it was revised, how it was revised, using whose software). | 101010101 1010101011 01010101 oioioioioioioio 01010101010101c ËlOlOlOlOlOlOlOj COMPUTER SECURITY SERIES Privacy Protection and Computer Forensics second edition MICHAEL A. CALOYANNIDES Privacy Protection and Computer Forensics Second Edition For quite a long time computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists electrical engineers and applied mathematicians. With the proliferation of open systems in general and of the Internet and the World Wide Web WWW in particular this situation has changed fundamentally. Today computer and network practitioners are equally interested in computer security since they require technologies and solutions that can be used to secure applications related to electronic commerce. Against this background the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the-art high standard technical books on topics related to computer security. Further information about the series can be found on the WWW at the following URL http Also if you d like to contribute to the series by writing a book about a topic related to computer security feel free to contact either the Commissioning Editor or the Series Editor at Artech House. For a listing of recent titles in the Artech House Computer Security Series turn to the back of this .