CART

(0) items

Computer Forensics and Cyber Crime : An Introduction,9780130907585
This item qualifies for
FREE SHIPPING!
FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Computer Forensics and Cyber Crime : An Introduction

by
Edition:
1st
ISBN13:

9780130907585

ISBN10:
0130907588
Format:
Paperback
Pub. Date:
1/1/2004
Publisher(s):
Prentice Hall

Related Products


  • Computer Forensics and Cyber Crime An Introduction
    Computer Forensics and Cyber Crime An Introduction
  • Computer Forensics and Cyber Crime An Introduction
    Computer Forensics and Cyber Crime An Introduction





Summary

Computer Forensics and Cyber Crime: An Introduction explores the current state of computer crime within the United States. Beginning with the 1970's, this work traces the history of technological crime, and identifies areas ripe for exploitation from technology savvy deviants. This book also evaluates forensic practices and software in light of government legislation, while providing a thorough analysis of emerging case law in a jurisprudential climate. Finally, this book outlines comprehensive guidelines for the development of computer forensic laboratories, the creation of computer crime task forces, and search and seizures of electronic equipment.

Table of Contents

Introduction
Cyberspace and Criminal Behavior
Clarification of Terms
Traditional Problems Associated with Computer Crime
Extent of the Problem
Conclusions
Computer Terminology and History
Computer Language
Network Language
A Brief History of Computers
Realms of the Cyberworld
A Brief History of the Internet
Categorizing Internet Communication
Future Issues and Conclusions
History of Crime and Computer Crime
Introduction
Traditional Problems
Recognizing and Defining Computer Crime
Three Incidents
Contemporary Crimes
Categorizing Computer Crime
Conclusions
Computers As Targets
Computers As Targets
Contaminants and Destruction of Data
Conclusions
Avenues for Prosecution and Government Efforts
Introduction
Traditional Statutes
Evolution of Computer-Specific Statutes
Evolving Child Pornography Statutes
Government Incentives
Law Enforcement Initiatives
International Efforts
Conclusions
Applying the First Amendment to Computer-Related Crime
Introduction and General Principles
Obscenity in General
Traditional Notions of Obscenity
Emerging Statutes and the Availability of Obscene Material to Children
Defining Child Pornography
Applying Case Law to Child Pornography Statutes
Technology-Specific Legislation
Conclusions
The Fourth Amendment
History of the Fourth Amendment
The Expectation of Privacy and Electronic Surveillence
Private vs. Public Searches
Application of Ortega to E-Mail
ECPA and PPA
Conclusions
Computer Forensic Terminology and Computer Investigations
Forensic Computer Science-An Emerging Discipline
Traditional Problems in Computer Investigations
Computer Forensic Science and Disk Structure
Conclusions
Developing Computer Forensic Science Capabilities
Introduction
Traditional Problems Associated with Finding Digital Evidence
Minimum Housing Requirements
Minimum Hardware Requirements
Minimum Software Requirements
Miscellaneous Documentation and Literature
Conclusions
Computer Investigations: Pre-Search Activities
Warrant Preparation and Application
Plan Preparation and Personnel Gathering
Preparing a Toolkit
Conclusions
On-Scene Activities
Approaching and Securing the Crime Scene
Determining the Need for Additional Assistance
Scene Processing
Data Analysis
Document
Establish Forensically-Sterile Conditions
Ensure Legitimacy and Validity of Analysis Tools
Physical Examination
Creation and Verification of Image
Passwords
Logical Examination
Restoration of Files
Listing of Files
Examination of Unallocated Space
Unlocking Files
Examination of User Data Files
Piping of Evidence
Examination of Executable Programs
Returning Equipment
A Word about DOS
Conclusions and Future Issues
Traditional Problems and Recommendations
Future Trends and Emerging Concerns
Conclusions
Bibliography
Table of Contents provided by Publisher. All Rights Reserved.


Please wait while the item is added to your cart...