Computer crime, investigation, and the law:
Synopsis: One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with c...
Saved in:
Main Authors: | , |
---|---|
Format: | Book |
Language: | English |
Published: |
Boston, MA
Course Technology
2011
|
Subjects: | |
Summary: | Synopsis: One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes |
Item Description: | Includes index |
Physical Description: | XVII, 499 S. ill. |
Staff View
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039686782 | ||
003 | DE-604 | ||
005 | 20120524 | ||
007 | t | ||
008 | 111107s2011 a||| |||| 00||| eng d | ||
020 | |z 9781435455320 |9 978-1-4354-5532-0 | ||
035 | |a (OCoLC)462922782 | ||
035 | |a (DE-599)BVBBV039686782 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-M382 | ||
100 | 1 | |a Easttom, Chuck |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer crime, investigation, and the law |c Chuck Easttom and Jeff Taylor |
264 | 1 | |a Boston, MA |b Course Technology |c 2011 | |
300 | |a XVII, 499 S. |b ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Synopsis: One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes | ||
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer crimes / Investigation | |
650 | 4 | |a Computer crimes / Law and legislation | |
650 | 7 | |a Computer crimes / United States |2 sears | |
650 | 7 | |a Computer security / Law and legislation / United States |2 sears | |
650 | 4 | |a Recht | |
651 | 4 | |a USA | |
700 | 1 | |a Taylor, Jeff |e Verfasser |4 aut | |
999 | |a oai:aleph.bib-bvb.de:BVB01-024535668 |
Record in the Search Index
_version_ | 1804148553781608448 |
---|---|
any_adam_object | |
author | Easttom, Chuck Taylor, Jeff |
author_facet | Easttom, Chuck Taylor, Jeff |
author_role | aut aut |
author_sort | Easttom, Chuck |
author_variant | c e ce j t jt |
building | Verbundindex |
bvnumber | BV039686782 |
ctrlnum | (OCoLC)462922782 (DE-599)BVBBV039686782 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02567nam a2200373 c 4500</leader><controlfield tag="001">BV039686782</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120524 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111107s2011 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781435455320</subfield><subfield code="9">978-1-4354-5532-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)462922782</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039686782</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Easttom, Chuck</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer crime, investigation, and the law</subfield><subfield code="c">Chuck Easttom and Jeff Taylor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Course Technology</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 499 S.</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Synopsis: One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / United States</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Law and legislation / United States</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Taylor, Jeff</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024535668</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV039686782 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:08:58Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024535668 |
oclc_num | 462922782 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | XVII, 499 S. ill. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Course Technology |
record_format | marc |
spelling | Easttom, Chuck Verfasser aut Computer crime, investigation, and the law Chuck Easttom and Jeff Taylor Boston, MA Course Technology 2011 XVII, 499 S. ill. txt rdacontent n rdamedia nc rdacarrier Includes index Synopsis: One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes Computer crimes Computer crimes / Investigation Computer crimes / Law and legislation Computer crimes / United States sears Computer security / Law and legislation / United States sears Recht USA Taylor, Jeff Verfasser aut |
spellingShingle | Easttom, Chuck Taylor, Jeff Computer crime, investigation, and the law Computer crimes Computer crimes / Investigation Computer crimes / Law and legislation Computer crimes / United States sears Computer security / Law and legislation / United States sears Recht |
title | Computer crime, investigation, and the law |
title_auth | Computer crime, investigation, and the law |
title_exact_search | Computer crime, investigation, and the law |
title_full | Computer crime, investigation, and the law Chuck Easttom and Jeff Taylor |
title_fullStr | Computer crime, investigation, and the law Chuck Easttom and Jeff Taylor |
title_full_unstemmed | Computer crime, investigation, and the law Chuck Easttom and Jeff Taylor |
title_short | Computer crime, investigation, and the law |
title_sort | computer crime investigation and the law |
topic | Computer crimes Computer crimes / Investigation Computer crimes / Law and legislation Computer crimes / United States sears Computer security / Law and legislation / United States sears Recht |
topic_facet | Computer crimes Computer crimes / Investigation Computer crimes / Law and legislation Computer crimes / United States Computer security / Law and legislation / United States Recht USA |
work_keys_str_mv | AT easttomchuck computercrimeinvestigationandthelaw AT taylorjeff computercrimeinvestigationandthelaw |