This book is intended to make the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. It is aimed primarily at graduates, postgraduates and researchers in digital forensics and cybersecurity.