Igital crime evolution and the detections
This technical report should be the culmination of good literature review work carried out through using a wide mix of sources: lecture slides, textbooks, industrial standards and guidelines, research papers, and web resources.
It should present the appropriate background on the topic area of interest. It should also present technical content in relative depth looking at all the issues concerned. The report needs an introduction at the beginning and a conclusion at the end. A list of resources referenced and a separate bibliography should be produced in the Harvard/IEEE reference format.
The key texts indicated in the module specification, specialist journals, and various Web sites, such as Computer Forensics, Cybercrime and Steganography Resources (/uk/), and The Metasploit Project Web site (), etc. provide a good guidance in terms of the report content.
The technical report is to be based on one of the topics listed below, which link to one or more sections of the module syllabus.
Added on 18.12.2014 14:22
the module syllabus is based around digital crime investigation