Section 4.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE CASE STUDY : THE CURIOUS MR. X.
Case study : The curious mr. x