did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780398075262

Investigating Computer Crime In The 21st Century

by
  • ISBN13:

    9780398075262

  • ISBN10:

    0398075263

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2004-12-01
  • Publisher: Charles C Thomas Pub Ltd
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $48.95

Table of Contents

Preface v
Preface to First Edition vii
Introduction 3(10)
PART ONE: THE CLASSIC APPROACH
Solvability Factors
13(14)
Solvability Factors
17(6)
System Documentation
23(2)
The Security Manager's Vantage Point
25(1)
The Investigator's Vantage Point
25(1)
Ideas for Discussion
26(1)
Retail Computer Security
27(10)
Problems Peculiar to Retail Computer Security
28(2)
Investigative Measures
30(5)
Information Security
35(1)
Ideas for Discussion
36(1)
Evil Whispers and Other Problems
37(19)
External Dark E-Mail
42(4)
Other Problems
46(8)
Other Frauds on the Internet
46(4)
Rumormongering on the Web
50(1)
The Problem of Persona
50(3)
Leaks to ``Watchdog'' Groups
53(1)
False Fronts
53(1)
Ideas for Discussion
54(2)
Intelligence Gathering
56(18)
Sources of Intelligence
59(5)
Inductive logic
64(4)
Establishing a Back Channel
68(1)
Scenarios
69(1)
Ideas for Discussion
70(4)
The Investigative Process: An Overview
74(12)
Determining the Method of Attack
78(5)
Other Steps
83(1)
Ideas for Discussion
83(3)
Establishing the Corpus Delicti
86(17)
A Sudden Loss of Service
87(3)
Charges or Credits in the Wrong Accounts
90(2)
Unexplained Computer Account Charges
92(2)
Information Leaks
94(6)
Web Sites of Interest
96(1)
Case Management
96(4)
Summary
100(1)
Ideas for Discussion
101(2)
Other Causes for Concern
103(23)
The Cold Case
106(7)
Investigating Sexual Exploitation in Cyberspace
113(7)
Web Sites of Interest
119(1)
Ideas for Discussion
120(6)
Preserving Evidence
126(21)
Attacks on Hardware and Environmental Support Systems
127(5)
Attacks on Software
132(3)
Attacks on Media
135(2)
Attacks on People
137(1)
A Word about Social Engineering
138(2)
A Word about Computer Forensics
140(4)
Ideas for Discussion
144(3)
Making Sure About the Evidence (Determining the Actual Attack)
147(9)
Ideas for Discussion
154(2)
Determining the Weak Points (Establishing an M.O.)
156(14)
Poor Peripheral Security
161(2)
A Breach of System Security
163(2)
Poor Input/Output Controls
165(1)
Wiretapping and Other Esoteric Problems
166(2)
Ideas for Discussion
168(2)
Determining the Responsible Parties
170(13)
Different Attacks
171(2)
Conducting Internal Investigations
173(4)
Conducting External Investigations
177(3)
Ideas for Discussion
180(3)
Deciding on a Course of Action
183(11)
Documenting the Loss
187(2)
Ideas for Discussion
189(5)
PART TWO: NEW TRENDS IN COMPUTER CRIME INVESTIGATION
Cryptography
194(7)
For Further Research
200(1)
Attack and Fault Trees
201(7)
Risk and Vulnerability Analysis
208(9)
Identity Theft
217(12)
Appendix A. EXTREMISTS AND OTHER THREATS FROM CYBERSPACE
229(9)
Information Warfare
229(4)
Security Scenario Writing
233(1)
A Sample Scenario
234(2)
Commentary
236(1)
Reader's Special Note
237(1)
Appendix B. GENERAL INVESTIGATIVE CHECKLIST
238(4)
Appendix C. INVESTIGATING THE BACKGROUND OF A COMPUTER FORENSICS OR OTHER COMPUTER EXPERT
242(2)
Appendix D. RISK ANALYSIS OUTLINE
244(2)
Appendix E. VULNERABILITY ANALYSIS FROM AN ATTACKER'S PERSPECTIVE
246(5)
Glossary 251(6)
Selected Bibliography 257(4)
Index 261

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program