CINXE.COM
types of digital forensics - Google Search
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-SG"><head><meta content="application/xhtml+xml; charset=UTF-8" http-equiv="Content-Type"/><meta content="no-cache" name="Cache-Control"/><title>types of digital forensics - Google Search</title><style>a{text-decoration:none;color:inherit}a:hover{text-decoration:underline}a img{border:0}body{font-family:arial,sans-serif;padding:8px;margin:0 auto;max-width:700px;min-width:240px;}.FbhRzb{border-left:thin solid #dadce0;border-right:thin solid #dadce0;border-top:thin solid #dadce0;height:40px;overflow:hidden}.n692Zd{margin-bottom:10px}.cvifge{height:40px;border-spacing:0}.QvGUP{height:40px;padding:0 8px 0 8px;vertical-align:top}.O4cRJf{height:40px;width:100%;padding:0;padding-right:16px}.O1ePr{height:40px;padding:0;vertical-align:top}.kgJEQe{height:36px;width:98px;vertical-align:top;margin-top:4px}.lXLRf{vertical-align:top}.MhzMZd{border:0;vertical-align:middle;font-size:14px;height:40px;padding:0;width:100%;padding-left:16px}.xB0fq{height:40px;border:none;font-size:14px;background-color:#1a73e8;color:#fff;padding:0 16px;margin:0;vertical-align:top;cursor:pointer}.xB0fq:focus{border:1px solid #1a73e8}.M7pB2{border:thin solid #dadce0;margin:0 0 3px 0;font-size:13px;font-weight:500;height:40px}.euZec{width:100%;height:40px;text-align:center;border-spacing:0}table.euZec td{padding:0;width:25%}.QIqI7{display:inline-block;padding-top:4px;font-weight:bold;color:#4285f4}.EY24We{border-bottom:2px solid #4285f4}.CsQyDc{display:inline-block;color:#70757a}.TuS8Ad{font-size:14px}.HddGcc{padding:8px;color:#70757a}.dzp8ae{font-weight:bold;color:#3c4043}.rEM8G{color:#70757a}.bookcf{table-layout:fixed;width:100%;border-spacing:0}.InWNIe{text-align:center}.uZgmoc{border:thin solid #dadce0;color:#70757a;font-size:14px;text-align:center;table-layout:fixed;width:100%}.frGj1b{display:block;padding:12px 0 12px 0;width:100%}.BnJWBc{text-align:center;padding:6px 0 13px 0;height:35px}</style></head><body><style>.ezO2md{border:thin solid #dadce0;padding:12px 16px 12px 16px;margin-bottom:10px;font-family:arial,sans-serif}.lIMUZd{font-family:arial,sans-serif}.Dks9wf{width:100%}.KZhhub{border-spacing:0;width:100%}.udTCfd{vertical-align:top;width:100%}.fYyStc{word-break:break-word}.ynsChf{display:block;white-space:nowrap;overflow:hidden;text-overflow:ellipsis}.Fj3V3b{color:#1967d2;font-size:14px;line-height:20px}.FrIlee{color:#202124;font-size:13px;line-height:20px}.F9iS2e{color:#70757a;font-size:13px;line-height:20px}.WMQ2Le{color:#70757a;font-size:12px;line-height:16px}.x3G5ab{color:#202124;font-size:18px;line-height:24px}.fuLhoc{color:#1967d2;font-size:18px;line-height:24px}.epoveb{font-size:32px;line-height:40px;font-weight:400;color:#202124}.dXDvrc{color:#0d652d;font-size:14px;line-height:20px;word-wrap:break-word}.dloBPe{font-weight:bold}.YVIcad{color:#70757a}.JkVVdd{color:#ea4335}.oXZRFd{color:#ea4335}.MQHtg{color:#fbbc04}.pyMRrb{color:#1e8e3e}.EtTZid{color:#1e8e3e}.M3vVJe{color:#1967d2}.qXLe6d{display:block}.NHQNef{font-style:italic}.Cb8Z7c{white-space:pre}a.ZWRArf{text-decoration:none}a .CVA68e:hover{text-decoration:underline}.gNEi4d{table-layout:fixed}.Y0aAmf{text-align:center}.iUhyd{vertical-align:bottom}.CO79Sb{position:relative}.WQbFld{bottom:0;left:0;margin:auto;position:absolute;right:0;top:0;background-image:url(https://www.gstatic.com/search_trustx/visibility_off_icon_p0-7d897bf44bafe5436baa9009e8716337.png);background-repeat:no-repeat;background-position:center;background-size:20px}.CSfvHb{padding-bottom:8px}.GN4D8d{margin:0}</style><div class="n692Zd"><div class="BnJWBc"><a class="lXLRf" href="/?sa=X&sca_esv=c744cb070de47b7e&output=search&tbm=bks&ved=0ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQPAgC"><img class="kgJEQe" src="/images/branding/searchlogo/1x/googlelogo_desk_heirloom_color_150x55dp.gif" alt="Google"/></a></div><div class="FbhRzb"><form action="/search"><input name="sca_esv" value="c744cb070de47b7e" type="hidden"/><input name="tbm" value="bks" type="hidden"/><input name="oq" type="hidden"/><input name="aqs" type="hidden"/><table class="cvifge"><tr><td class="O4cRJf"><input class="MhzMZd" value="types of digital forensics" name="q" type="text"/></td><td class="O1ePr"><input class="xB0fq" value="Search" type="submit"/></td></tr></table></form></div><div class="M7pB2"><table class="euZec"><tbody><tr><td><a class="CsQyDc" href="/search?q=types+of+digital+forensics&sca_esv=c744cb070de47b7e&source=lnms&sa=X&ved=0ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ_AUIBCgA">ALL</a></td><td><a class="CsQyDc" href="/search?q=types+of+digital+forensics&sca_esv=c744cb070de47b7e&tbm=isch&source=lnms&sa=X&ved=0ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ_AUIBSgB">IMAGES</a></td><td><a class="CsQyDc" href="/search?q=types+of+digital+forensics&sca_esv=c744cb070de47b7e&tbm=nws&source=lnms&sa=X&ved=0ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ_AUIBigC">NEWS</a></td><td class="EY24We"><span class="QIqI7">BOOKS</span></td></tr></tbody></table></div></div><div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=xNjsDprqtUYC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgFEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Handbook of Digital Forensics and Investigation</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=xNjsDprqtUYC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgFEAI"><table class="gNEi4d"><tbody><tr><td style="width:60px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=xNjsDprqtUYC&printsec=frontcover&img=1&zoom=5&edge=curl&h=73&w=60" style="width:60px;height:73px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=1jMHq-fMYWgC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgJEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Digital Forensics for Legal Professionals: Understanding ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=1jMHq-fMYWgC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgJEAI"><table class="gNEi4d"><tbody><tr><td style="width:60px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=1jMHq-fMYWgC&printsec=frontcover&img=1&zoom=5&edge=curl&h=73&w=60" style="width:60px;height:73px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">Additionally, this book provides the right way to select a qualified expert, what to expect from a qualified expert, and how to properly use experts before and during trial.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=P0Hwx4F8Q7cC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgCEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Digital Forensics Processing and Procedures: Meeting the ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=P0Hwx4F8Q7cC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgCEAI"><table class="gNEi4d"><tbody><tr><td style="width:60px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=P0Hwx4F8Q7cC&printsec=frontcover&img=1&zoom=5&edge=curl&h=73&w=60" style="width:60px;height:73px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=hI3dqOyboegC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgBEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">The Best Damn Cybercrime and Digital Forensics Book Period</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=hI3dqOyboegC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgBEAI"><table class="gNEi4d"><tbody><tr><td style="width:60px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=hI3dqOyboegC&printsec=frontcover&img=1&zoom=5&edge=curl&h=74&w=60" style="width:60px;height:74px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=toOpy1j4fVQC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgHEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Digital Forensics: Digital Evidence in Criminal Investigations</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=toOpy1j4fVQC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgHEAI"><table class="gNEi4d"><tbody><tr><td style="width:53px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=toOpy1j4fVQC&printsec=frontcover&img=1&zoom=5&edge=curl&h=80&w=53" style="width:53px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=J8h8VWUmDuYC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgEEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Digital Forensics with Open Source Tools</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=J8h8VWUmDuYC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgEEAI"><table class="gNEi4d"><tbody><tr><td style="width:60px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=J8h8VWUmDuYC&printsec=frontcover&img=1&zoom=5&edge=curl&h=73&w=60" style="width:60px;height:73px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=H-59BAAAQBAJ&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgIEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">The Basics of Digital Forensics: The Primer for Getting ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=H-59BAAAQBAJ&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgIEAI"><table class="gNEi4d"><tbody><tr><td style="width:60px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=H-59BAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&h=73&w=60" style="width:60px;height:73px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=bfpmDwAAQBAJ&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgDEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Fundamentals of Digital Forensics: Theory, Methods, and ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=bfpmDwAAQBAJ&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgDEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=bfpmDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&h=80&w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can’t.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=6gCbJ4O4f-IC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgAEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Digital Evidence and Computer Crime: Forensic Science, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=6gCbJ4O4f-IC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgAEAI"><table class="gNEi4d"><tbody><tr><td style="width:57px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=6gCbJ4O4f-IC&printsec=frontcover&img=1&zoom=5&edge=curl&h=80&w=57" style="width:57px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">This work explains how computer networks function and how they can be used in a crime.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=Hs23Aax60XoC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6AF6BAgGEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Alternate Data Storage Forensics</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=Hs23Aax60XoC&printsec=frontcover&dq=types+of+digital+forensics&hl=en&sa=X&ved=2ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQ6wF6BAgGEAI"><table class="gNEi4d"><tbody><tr><td style="width:60px"> <div class="CO79Sb"> <img class="iUhyd" alt="types of digital forensics from books.google.com.sg" src="https://encrypted.google.com/books?id=Hs23Aax60XoC&printsec=frontcover&img=1&zoom=5&edge=curl&h=74&w=60" style="width:60px;height:74px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">This book sets a new forensic methodology standard for investigators to use.This book begins by describing how alternate data storage devices are used to both move and hide data.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div></div><table class="uZgmoc"><tbody><td><a class="frGj1b" href="/search?q=types+of+digital+forensics&sca_esv=c744cb070de47b7e&tbm=bks&ei=u7JEZ_zVHaKv4-EPiL-uoQQ&start=10&sa=N">Next ></a></td></tbody></table><br/><div class="TuS8Ad" data-ved="0ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQpyoIMQ"><style>.VYM29{font-weight:bold}</style><div class="HddGcc" align="center"><span class="VYM29">Singapore</span><span> - </span><span>From your IP address</span><span> - </span><a href="/url?q=https://support.google.com/websearch%3Fp%3Dws_settings_location%26hl%3Den-SG&opi=89978449&sa=U&ved=0ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQty4IMg&usg=AOvVaw1jF4mQVg5geGMUk-oCRX3v">Learn more</a></div><div align="center"><a class="rEM8G" href="/url?q=https://accounts.google.com/ServiceLogin%3Fcontinue%3Dhttps://www.google.com/search%253Fq%253Dtypes%252Bof%252Bdigital%252Bforensics%2526sca_esv%253Dc744cb070de47b7e%2526tbm%253Dbks%2526source%253Dlnms%2526sa%253DX%2526ved%253D0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ_AUIBygD%26hl%3Den&opi=89978449&sa=U&ved=0ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQxs8CCDM&usg=AOvVaw1QxCngHaqkNGC8KUj7aY4k">Sign in</a></div><div><table class="bookcf"><tbody class="InWNIe"><tr><td><a class="rEM8G" href="https://www.google.com/preferences?hl=en&sa=X&ved=0ahUKEwi8n_WBgPiJAxWi1zgGHYifK0QQv5YECDQ">Settings</a></td><td><a class="rEM8G" href="https://www.google.com/intl/en_sg/policies/privacy/">Privacy</a></td><td><a class="rEM8G" href="https://www.google.com/intl/en_sg/policies/terms/">Terms</a></td></tr></tbody></table></div></div><div> </div></body></html>