Computer Crime, Investigation, and the Law - Chuck Easttom, Jeff Taylor

Computer Crime, Investigation, and the Law

Buch | Softcover
576 Seiten
2010 | New edition
Delmar Cengage Learning (Verlag)
978-1-4354-5532-0 (ISBN)
32,40 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Offers an introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. This book walks you through the essentials of computer forensics.
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys.

If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes.

Chuck Easttom has 15 years' experience in the IT industry and has been an expert witness on several computer-related cases. He is the author of ten computer-science books including two textbooks on computer security. He was also one of the subject matter experts who helped to create CompTIA's Security+ certification test. He has been a frequent guest speaker on computer security at various computer groups and campuses including Harvard and Columbia. He holds more than a dozen computer industry certifications. Jeff Taylor is a McKinney, Texas, police detective who began his law-enforcement career in 1982. He is currently assigned to the Criminal Investigations unit, where he specializes in white-collar crimes. In 2003, Detective Taylor became certified in computer-forensic evidence recovery. He uses various computer software systems, including EnCase, Helix, and I-Look. He has received training and certifications from the FBI, Cyber Evidence Inc., the National White Collar Crime Center, and the High Intensity Drug Trafficking Area (HIDTA) task force. Detective Taylor is on the instructor staff at the Collin County Law Enforcement Academy, where he teaches a course on electronic crime scene investigations.

PART 1 Computer Crime.
1. Introduction to Computer Crime.
2. A History of Computer Crime in America.
3. United States Computer Laws Part I.
4. United States Computer Laws Part II.
5. Techniques and resources for Computer Crime.
6. Organized Crime and Cyber Terrorism.
PART 2 COMPUTER FORENSICS.
7. Observing, Collecting, Documenting, and Storing Electronic Evidence.
8. Collecting Evidence from Hardware.
9. Collecting Evidence from the Operating System.
10. Collecting Evidence from Other Sources.
PART 3 Litigation.
11. Experts and Expert Reports.
12. Depositions and Trials.
13. Civil Matters Relating to Computer Crime.
PART 4 Computer Crime and Individuals.
14. Protecting Children on the Internet.
15. How to Protect Your Identity on the Internet.
16. Harassment and Stalking Via the Computer.
PART 5 Techniques.
17. Hacker Techniques.
18. How Cyber Criminals Communicate.
APPENDIXES
Appendix A Introduction to Computer Networks.
Appendix B Glossary.
Front Matter.
Index.

Erscheint lt. Verlag 9.4.2010
Verlagsort Clifton Park
Sprache englisch
Maße 189 x 233 mm
Gewicht 1060 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Recht / Steuern Strafrecht Kriminologie
Schlagworte Computersicherheit
ISBN-10 1-4354-5532-0 / 1435455320
ISBN-13 978-1-4354-5532-0 / 9781435455320
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00