Permalien Courriel Export
Livre imprimé
Computer forensics : cybercriminals, laws, and evidence
Auteur
Éditeur Jones & Bartlett Learning
Année copyright 2015
Exemplaires
Notices liées
Notice détaillée
Auteur
Titre
Computer forensics : cybercriminals, laws, and evidence
Édition
Second edition
Éditeur
Description
1 vol. (XV-408 pages) : illustrations ; 23 cm
Notes
Notes bibliogr. en fin de chapitre. Index
Sujets
Classification Dewey
363.25
Contenu
1. Entering the world of cybercrime ; Cybercrime : defined ; Cybercrime versus traditional crime ; Cybercrime categories ; Combating cybercrime ; 2. An introduction to computer forensics investigations and electronic evidence ; Computer forensics : what is it? ; Computer forensics investigations : the basics ; Computer forensics investigations : a four-step process ; Electronic evidence : what is it? ; Types of evidence ; Authentication of evidence ; Standards of evidence ; 3. Laws regulating access to electronic evidence ; Telecommunications and electronic communications data ; The statutory background of privacy protection and government access to data ; 4. Searches and seizures of computers and electronic evidence ; What is privacy and why is it important? ; Constitutional source of privacy protection : the Fourth Amendment ; Search warrants ; Searching a computer for evidence ; 5. Cybercrime laws : which statute for which crime? ; Computer threats and intrusions ; Financial crimes and fraud ; Intellectual property theft and economic espionage ; Personal crimes ; 6. Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! ; The art of deceiving : social engineering ; Scams and scam artists ; Identity theft ; Cyberbullying ; Child exploitation online ; 7. Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it ; Defining cyberterrorism ; Criminalizing cyberterrorism ; combating cyberterrorism ; 8. Where is the electronic evidence and which tools can we use to find it? ; The location of electronic evidence ; Tools used to search and collect electronic evidence ; 9. Crime and incident scene : what should an investigator do? ; Conducting an investigation ; Special considerations for cybercrime investigations ; Identifying evidence ; Analysis of evidence ; How to handle evidence in an investigation ; Hypothetical criminal investigation ; Extracting electronic evidence ; 10. Corporate crimes and policy violations involving computers : how to conduct a corporate investigation ; Corporate investigations ; Corporate criminal activities and policy violations ; Preparing for the investigation ; Conducting the investigation ; 11. E-mail forensics ; The importance of email investigations ; Email : the basics ; How to conduct an email investigation ; Problems encountered by computer forensics investigators ; 12. Network forensics : an introduction ; Stand-alone versus networked devices ; Computer networks ; Network components ; Where can network-related evidence be found? ; Network forensics analysis tools ; Special issues when conducting investigations in a networked environment ; Preliminary analysis ; Documentation and collection ; Analysis and preservation ; 13. Mobile devices in computer forensics investigations ; Role of mobile devices ; Mobile phones and PDAs versus other electronic devices ; which tools can be used to retrieve evidence? ; Mobile device investigations ; 14. The pretrial and courtroom experiences of a computer forensics investigator ; Pretrial procedures ; Testimony and rules of evidence ; The role of the computer forensics investigator in pretrial proceedings and court
ISBN
978-1-4496-9222-3
1-4496-9222-2
Origine de la notice
Abes (SUDOC)
 

inMedia v4.4