Computer Forensics and Cyber Crime

Computer Forensics and Cyber Crime : An Introduction

3.82 (34 ratings by Goodreads)
By (author) 

List price: US$61.80

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

For undergraduate introductory courses in Computers in Criminal Justice, Forensic Science, Criminal Investigation, White Collar Crime, and Computer Crime. This one-of-a-kind text introduces students to computer crime and the techniques used to investigate computer crimes. "Computer Forensics and Cyber Crime" defines cyber crime, introduces students to computer terminology and the history of computer crime, and includes discussions of important legal and social issues relating to computer crime. The text also covers computer forensic science, providing students with cutting-edge techniques used to investigate computer crime scenes as well as computer hardware and software to solve computer crimes.show more

Product details

  • Paperback | 272 pages
  • 172.7 x 233.7 x 12.7mm | 385.56g
  • Pearson Education (US)
  • Prentice Hall
  • Upper Saddle River, United States
  • English
  • 0130907588
  • 9780130907585
  • 1,654,873

Review quote

"Computer Forensics and Cyber Crime: An Introduction should he a welcomed addition to all parents' bookshelves." -- Dr: Ed Whittle, Florida Metropolitan University, Tampa, FL "Computer Forensics and Cyber Crime: An Introduction likely constitute(s) the most definitive reference material on the subject of computer-related crime, cyber crime law, and computer crime investigation including the management and custody of evidence. Although the number of books prepared on the subject of computer-related crime and investigations has increased quite a bit in quantity and quality during the last two years, to my knowledge, they are not as thorough, comprehensive, and easy-to-read as this one ...this-text is far superior to any of those... This book could very well become the Bible for computer crime across the U.S. and possibly in Britain, Canada, and elsewhere too." -- Scott Senja, Weber State University, Ogden, UT "This is the most extensive and comprehensive text reviewed in our quest for appropriate material." -- Karen Weston, Gannon University; Eric, PAshow more

Table of contents

1. Introduction. Cyberspace and Criminal Behavior. Clarification of Terms. Traditional Problems Associated with Computer Crime. Extent of the Problem. Conclusions. 2. Computer Terminology and History. Computer Language. Network Language. A Brief History of Computers. Realms of the Cyberworld. A Brief History of the Internet. Categorizing Internet Communication. Future Issues and Conclusions. 3. History of Crime and Computer Crime. Introduction. Traditional Problems. Recognizing and Defining Computer Crime. Three Incidents. Contemporary Crimes. Categorizing Computer Crime. Conclusions. 4. Computers As Targets. Computers As Targets. Contaminants and Destruction of Data. Conclusions. 5. Avenues for Prosecution and Government Efforts. Introduction. Traditional Statutes. Evolution of Computer-Specific Statutes. Evolving Child Pornography Statutes. Government Incentives. Law Enforcement Initiatives. International Efforts. Conclusions. 6. Applying the First Amendment to Computer-Related Crime. Introduction and General Principles. Obscenity in General. Traditional Notions of Obscenity. Emerging Statutes and the Availability of Obscene Material to Children. Defining Child Pornography. Applying Case Law to Child Pornography Statutes. Technology-Specific Legislation. Conclusions. 7. The Fourth Amendment. History of the Fourth Amendment. The Expectation of Privacy and Electronic Surveillence. Private vs. Public Searches. Application of Ortega to E-Mail. ECPA and PPA. Conclusions. 8. Computer Forensic Terminology and Computer Investigations. Forensic Computer Science-An Emerging Discipline. Traditional Problems in Computer Investigations. Computer Forensic Science and Disk Structure. Conclusions. 9. Developing Computer Forensic Science Capabilities. Introduction. Traditional Problems Associated with Finding Digital Evidence. Minimum Housing Requirements. Minimum Hardware Requirements. Minimum Software Requirements. Miscellaneous Documentation and Literature. Conclusions. 10. Computer Investigations: Pre-Search Activities. Warrant Preparation and Application. Plan Preparation and Personnel Gathering. Preparing a Toolkit. Conclusions. 11. On-Scene Activities. Approaching and Securing the Crime Scene. Determining the Need for Additional Assistance. Scene Processing. 12. Data Analysis. Document. Establish Forensically-Sterile Conditions. Ensure Legitimacy and Validity of Analysis Tools. Physical Examination. Creation and Verification of Image. Passwords. Logical Examination. Restoration of Files. Listing of Files. Examination of Unallocated Space. Unlocking Files. Examination of User Data Files. Piping of Evidence. Examination of Executable Programs. Returning Equipment. A Word about DOS. 13. Conclusions and Future Issues. Traditional Problems and Recommendations. Future Trends and Emerging Concerns. Conclusions. Bibliography.show more

Rating details

34 ratings
3.82 out of 5 stars
5 24% (8)
4 41% (14)
3 29% (10)
2 6% (2)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X