Cyber Crime Investigator's Field GuideCRC Press, 2. aug. 2004 - 360 sider Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace. Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. You get easy access to information such as: We now have software and hardware to protect our data communication systems. We have laws that provide law enforcement more teeth to take a bite out of cyber crime. Now we need to combine understanding investigative techniques and technical knowledge of cyberspace. That's what this book does. Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime...tools that tell you the who, where, what, when, why, and how. |
Andre utgaver - Vis alle
Cyber Crime Investigator's Field Guide, Second Edition Bruce Middleton Ingen forhåndsvisning tilgjengelig - 2005 |
Vanlige uttrykk og setninger
10th Cir 9th Cir affidavit application authority bitstream backup boot cable child pornography Click client command computer files computer network computer records computer system contain contraband copy Crime Investigator’s Field criminal Cyber Crime Investigator’s defendant’s deleted disclosure disk diskette e-mail ECPA electronic communication service electronic storage employees encryption example expectation of privacy filename firewall Fourth Amendment hacker hard drive interception Internet Service Provider investigation Investigator’s Field Guide IP address Justice Search keywords law enforcement logs mcrypt Microsoft monitoring obtain option password pen/trap permit port press enter probable cause pursuant reasonable expectation remote computing service Rule 41 SafeBack SCSI Search and Seizure search warrant seized computer Seizure Guidelines server Steve Jackson Games stored subpoena subscriber Supp Supp.2d suppression system administrator telephone telnet Title U.S. Department United UNIX violate wire communications xterm Zip Drive
Referanser til denne boken
Cyber Warfare and Cyber Terrorism Janczewski, Lech,Colarik, Andrew Ingen forhåndsvisning tilgjengelig - 2007 |
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks Susan Young,Dave Aitel Begrenset visning - 2003 |