The investigator's guide to computer crime:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Springfield, Ill.
Charles C. Thomas
©2006
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas Includes bibliographical references and index SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary |
Beschreibung: | 1 Online-Ressource (xv, 312 pages) |
ISBN: | 0398076014 0398084580 9780398076016 9780398084585 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043103040 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2006 |||| o||u| ||||||eng d | ||
020 | |a 0398076014 |9 0-398-07601-4 | ||
020 | |a 0398084580 |c electronic bk. |9 0-398-08458-0 | ||
020 | |a 9780398076016 |9 978-0-398-07601-6 | ||
020 | |a 9780398084585 |c electronic bk. |9 978-0-398-08458-5 | ||
035 | |a (OCoLC)689996291 | ||
035 | |a (DE-599)BVBBV043103040 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.25/968 |2 22 | |
100 | 1 | |a Franklin, Carl J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The investigator's guide to computer crime |c by Carl J. Franklin |
264 | 1 | |a Springfield, Ill. |b Charles C. Thomas |c ©2006 | |
300 | |a 1 Online-Ressource (xv, 312 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas | ||
500 | |a Includes bibliographical references and index | ||
500 | |a SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary | ||
650 | 4 | |a Social Science | |
650 | 7 | |a LAW / Forensic Science |2 bisacsh | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 4 | |a Computer crimes |x Investigation |v Handbooks, manuals, etc | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 0-398-07602-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-398-07602-3 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452683 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028527231 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452683 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452683 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175515195539456 |
---|---|
any_adam_object | |
author | Franklin, Carl J. |
author_facet | Franklin, Carl J. |
author_role | aut |
author_sort | Franklin, Carl J. |
author_variant | c j f cj cjf |
building | Verbundindex |
bvnumber | BV043103040 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)689996291 (DE-599)BVBBV043103040 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03277nmm a2200457zc 4500</leader><controlfield tag="001">BV043103040</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0398076014</subfield><subfield code="9">0-398-07601-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0398084580</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-398-08458-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780398076016</subfield><subfield code="9">978-0-398-07601-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780398084585</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-398-08458-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)689996291</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043103040</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Franklin, Carl J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The investigator's guide to computer crime</subfield><subfield code="c">by Carl J. Franklin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Springfield, Ill.</subfield><subfield code="b">Charles C. Thomas</subfield><subfield code="c">©2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 312 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Forensic Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">0-398-07602-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-398-07602-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452683</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028527231</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452683</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452683</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043103040 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:31Z |
institution | BVB |
isbn | 0398076014 0398084580 9780398076016 9780398084585 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028527231 |
oclc_num | 689996291 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xv, 312 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Charles C. Thomas |
record_format | marc |
spelling | Franklin, Carl J. Verfasser aut The investigator's guide to computer crime by Carl J. Franklin Springfield, Ill. Charles C. Thomas ©2006 1 Online-Ressource (xv, 312 pages) txt rdacontent c rdamedia cr rdacarrier With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas Includes bibliographical references and index SECTION 1: ESTABLISHING STANDARDS FOR THE COMPUTER CRIME INVESTIGATION: The growing trend of computer crime -- The computer crime investigation team -- The computer system in the criminal enterprise -- The computer crime lab -- Expert assistance -- SECTION 2: SPECIFIC COMPUTER CRIMES: Hardware and software crimes -- Theft of information -- Cyberstalking -- Identity theft -- SECTION 3: THE COMPUTER CRIME INVESTIGATION: Initial assessment and response to the computer crime -- Applying forensic science to computers -- Tracking the offender -- SECTION 4: SEARCH, SEIZURE, AND DIGITAL EVIDENCE: Computer-related evidence -- Fourth Amendment principles and computer searches -- Appendix A: Identifying the computer components -- Appendix B: Understanding software -- Appendix C: Networks and communication systems -- Appendix D: Computer seizure checklist -- Glossary Social Science LAW / Forensic Science bisacsh Computer crimes / Investigation fast Computer crimes Investigation Handbooks, manuals, etc Erscheint auch als Druck-Ausgabe, Paperback 0-398-07602-2 Erscheint auch als Druck-Ausgabe, Paperback 978-0-398-07602-3 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452683 Aggregator Volltext |
spellingShingle | Franklin, Carl J. The investigator's guide to computer crime Social Science LAW / Forensic Science bisacsh Computer crimes / Investigation fast Computer crimes Investigation Handbooks, manuals, etc |
title | The investigator's guide to computer crime |
title_auth | The investigator's guide to computer crime |
title_exact_search | The investigator's guide to computer crime |
title_full | The investigator's guide to computer crime by Carl J. Franklin |
title_fullStr | The investigator's guide to computer crime by Carl J. Franklin |
title_full_unstemmed | The investigator's guide to computer crime by Carl J. Franklin |
title_short | The investigator's guide to computer crime |
title_sort | the investigator s guide to computer crime |
topic | Social Science LAW / Forensic Science bisacsh Computer crimes / Investigation fast Computer crimes Investigation Handbooks, manuals, etc |
topic_facet | Social Science LAW / Forensic Science Computer crimes / Investigation Computer crimes Investigation Handbooks, manuals, etc |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452683 |
work_keys_str_mv | AT franklincarlj theinvestigatorsguidetocomputercrime |