Cyber Crime Investigator's Field GuideCRC Press, 2 août 2004 - 360 pages Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace. Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. You get easy access to information such as: We now have software and hardware to protect our data communication systems. We have laws that provide law enforcement more teeth to take a bite out of cyber crime. Now we need to combine understanding investigative techniques and technical knowledge of cyberspace. That's what this book does. Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime...tools that tell you the who, where, what, when, why, and how. |
Autres éditions - Tout afficher
Expressions et termes fréquents
10th Cir 9th Cir affidavit application authority bitstream backup boot cable child pornography Click client command computer files computer network computer records computer system contain contraband copy Crime Investigator’s Field criminal Cyber Crime Investigator’s defendant’s deleted disclosure disk diskette e-mail ECPA electronic communication service electronic storage employees encryption example expectation of privacy filename firewall Fourth Amendment hacker hard drive interception Internet Service Provider investigation Investigator’s Field Guide IP address Justice Search keywords law enforcement logs mcrypt Microsoft monitoring obtain option password pen/trap permit port press enter probable cause pursuant reasonable expectation remote computing service Rule 41 SafeBack SCSI Search and Seizure search warrant seized computer Seizure Guidelines server Steve Jackson Games stored subpoena subscriber Supp Supp.2d suppression system administrator telephone telnet Title U.S. Department United UNIX violate wire communications xterm Zip Drive