did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780130907585

Computer Forensics and Cyber Crime: An Introduction

by
  • ISBN13:

    9780130907585

  • ISBN10:

    0130907588

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2004-01-01
  • Publisher: Pearson College Div
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $61.80

Summary

Computer Forensics and Cyber Crime: An Introduction explores the current state of computer crime within the United States. Beginning with the 1970's, this work traces the history of technological crime, and identifies areas ripe for exploitation from technology savvy deviants. This book also evaluates forensic practices and software in light of government legislation, while providing a thorough analysis of emerging case law in a jurisprudential climate. Finally, this book outlines comprehensive guidelines for the development of computer forensic laboratories, the creation of computer crime task forces, and search and seizures of electronic equipment.

Table of Contents

Introduction
Cyberspace and Criminal Behavior
Clarification of Terms
Traditional Problems Associated with Computer Crime
Extent of the Problem
Conclusions
Computer Terminology and History
Computer Language
Network Language
A Brief History of Computers
Realms of the Cyberworld
A Brief History of the Internet
Categorizing Internet Communication
Future Issues and Conclusions
History of Crime and Computer Crime
Introduction
Traditional Problems
Recognizing and Defining Computer Crime
Three Incidents
Contemporary Crimes
Categorizing Computer Crime
Conclusions
Computers As Targets
Computers As Targets
Contaminants and Destruction of Data
Conclusions
Avenues for Prosecution and Government Efforts
Introduction
Traditional Statutes
Evolution of Computer-Specific Statutes
Evolving Child Pornography Statutes
Government Incentives
Law Enforcement Initiatives
International Efforts
Conclusions
Applying the First Amendment to Computer-Related Crime
Introduction and General Principles
Obscenity in General
Traditional Notions of Obscenity
Emerging Statutes and the Availability of Obscene Material to Children
Defining Child Pornography
Applying Case Law to Child Pornography Statutes
Technology-Specific Legislation
Conclusions
The Fourth Amendment
History of the Fourth Amendment
The Expectation of Privacy and Electronic Surveillence
Private vs. Public Searches
Application of Ortega to E-Mail
ECPA and PPA
Conclusions
Computer Forensic Terminology and Computer Investigations
Forensic Computer Science-An Emerging Discipline
Traditional Problems in Computer Investigations
Computer Forensic Science and Disk Structure
Conclusions
Developing Computer Forensic Science Capabilities
Introduction
Traditional Problems Associated with Finding Digital Evidence
Minimum Housing Requirements
Minimum Hardware Requirements
Minimum Software Requirements
Miscellaneous Documentation and Literature
Conclusions
Computer Investigations: Pre-Search Activities
Warrant Preparation and Application
Plan Preparation and Personnel Gathering
Preparing a Toolkit
Conclusions
On-Scene Activities
Approaching and Securing the Crime Scene
Determining the Need for Additional Assistance
Scene Processing
Data Analysis
Document
Establish Forensically-Sterile Conditions
Ensure Legitimacy and Validity of Analysis Tools
Physical Examination
Creation and Verification of Image
Passwords
Logical Examination
Restoration of Files
Listing of Files
Examination of Unallocated Space
Unlocking Files
Examination of User Data Files
Piping of Evidence
Examination of Executable Programs
Returning Equipment
A Word about DOS
Conclusions and Future Issues
Traditional Problems and Recommendations
Future Trends and Emerging Concerns
Conclusions
Bibliography
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program