Introduction | |
Cyberspace and Criminal Behavior | |
Clarification of Terms | |
Traditional Problems Associated with Computer Crime | |
Extent of the Problem | |
Conclusions | |
Computer Terminology and History | |
Computer Language | |
Network Language | |
A Brief History of Computers | |
Realms of the Cyberworld | |
A Brief History of the Internet | |
Categorizing Internet Communication | |
Future Issues and Conclusions | |
History of Crime and Computer Crime | |
Introduction | |
Traditional Problems | |
Recognizing and Defining Computer Crime | |
Three Incidents | |
Contemporary Crimes | |
Categorizing Computer Crime | |
Conclusions | |
Computers As Targets | |
Computers As Targets | |
Contaminants and Destruction of Data | |
Conclusions | |
Avenues for Prosecution and Government Efforts | |
Introduction | |
Traditional Statutes | |
Evolution of Computer-Specific Statutes | |
Evolving Child Pornography Statutes | |
Government Incentives | |
Law Enforcement Initiatives | |
International Efforts | |
Conclusions | |
Applying the First Amendment to Computer-Related Crime | |
Introduction and General Principles | |
Obscenity in General | |
Traditional Notions of Obscenity | |
Emerging Statutes and the Availability of Obscene Material to Children | |
Defining Child Pornography | |
Applying Case Law to Child Pornography Statutes | |
Technology-Specific Legislation | |
Conclusions | |
The Fourth Amendment | |
History of the Fourth Amendment | |
The Expectation of Privacy and Electronic Surveillence | |
Private vs. Public Searches | |
Application of Ortega to E-Mail | |
ECPA and PPA | |
Conclusions | |
Computer Forensic Terminology and Computer Investigations | |
Forensic Computer Science-An Emerging Discipline | |
Traditional Problems in Computer Investigations | |
Computer Forensic Science and Disk Structure | |
Conclusions | |
Developing Computer Forensic Science Capabilities | |
Introduction | |
Traditional Problems Associated with Finding Digital Evidence | |
Minimum Housing Requirements | |
Minimum Hardware Requirements | |
Minimum Software Requirements | |
Miscellaneous Documentation and Literature | |
Conclusions | |
Computer Investigations: Pre-Search Activities | |
Warrant Preparation and Application | |
Plan Preparation and Personnel Gathering | |
Preparing a Toolkit | |
Conclusions | |
On-Scene Activities | |
Approaching and Securing the Crime Scene | |
Determining the Need for Additional Assistance | |
Scene Processing | |
Data Analysis | |
Document | |
Establish Forensically-Sterile Conditions | |
Ensure Legitimacy and Validity of Analysis Tools | |
Physical Examination | |
Creation and Verification of Image | |
Passwords | |
Logical Examination | |
Restoration of Files | |
Listing of Files | |
Examination of Unallocated Space | |
Unlocking Files | |
Examination of User Data Files | |
Piping of Evidence | |
Examination of Executable Programs | |
Returning Equipment | |
A Word about DOS | |
Conclusions and Future Issues | |
Traditional Problems and Recommendations | |
Future Trends and Emerging Concerns | |
Conclusions | |
Bibliography | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.