Computer Crime, Investigation, and the Law

by ;
  • ISBN13:


  • ISBN10:


  • Format: Paperback
  • Copyright: 2010-04-09
  • Publisher: Cengage Learning PTR
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $1.84
    Check/Direct Deposit: $1.75
List Price: $39.95


One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes.

Table of Contents

Computer Crime
Introduction to Computer Crime
A History of Computer Crime in America
United States Computer Laws Part I
United States Computer Laws Part II
Techniques and resources for Computer Crime
Organized Crime and Cyber Terrorism
Computer Forensics
Observing, Collecting, Documenting, and Storing Electronic Evidence
Collecting Evidence from Hardware
Collecting Evidence from the Operating System
Collecting Evidence from Other Sources
Experts and Expert Reports
Depositions and Trials
Civil Matters Relating to Computer Crime
Computer Crime and Individuals
Protecting Children on the Internet
How to Protect Your Identity on the Internet
Harassment and Stalking Via the Computer
Hacker Techniques
How Cyber Criminals Communicate
Introduction to Computer Networks
Front Matter
Table of Contents provided by Publisher. All Rights Reserved.

Rewards Program

Write a Review