High-technology crime investigator's handbook :: establishing and managing a high-technology crime prevention program /
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Butterworth-Heinemann/Elsevier,
©2006.
|
Ausgabe: | 2nd ed. |
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers. |
Beschreibung: | 1 online resource (xxvii, 470 pages) : illustrations, map |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780750679299 0750679298 9780080468204 0080468209 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162593811 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070806s2006 ne ab ob 001 0 eng d | ||
010 | |a 2006004111 | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCG |d OCLCQ |d N$T |d YDXCP |d MERUC |d UBY |d E7B |d IDEBK |d OCLCQ |d OCLCF |d OCLCQ |d COO |d B24X7 |d OCLCQ |d AZK |d JBG |d OCLCA |d AGLDB |d COCUF |d STF |d MOR |d PIFAG |d OCLCQ |d VNS |d WRM |d D6H |d VTS |d CEF |d INT |d VT2 |d OCLCQ |d WYU |d OCLCQ |d LEAUB |d M8D |d UKCRE |d BOL |d BRF |d EYM |d OCLCQ |d OCLCO |d MHW |d OCLCO |d OCLCQ |d KSU |d OCLCQ |d OCLCO |d OCLCL |d EZC |d INARC |d OCLCQ | ||
019 | |a 122380044 |a 154684578 |a 441774376 |a 505066955 |a 648164152 |a 712975861 |a 961693624 |a 962720345 |a 966388440 |a 984814069 |a 988536332 |a 991992535 |a 1034946074 |a 1037696882 |a 1038700042 |a 1055385369 |a 1060191978 |a 1062915264 |a 1081241280 |a 1114385502 |a 1153523345 |a 1179804891 |a 1194831389 |a 1228585104 |a 1331423823 | ||
020 | |a 9780750679299 | ||
020 | |a 0750679298 | ||
020 | |a 9780080468204 |q (electronic bk.) | ||
020 | |a 0080468209 |q (electronic bk.) | ||
035 | |a (OCoLC)162593811 |z (OCoLC)122380044 |z (OCoLC)154684578 |z (OCoLC)441774376 |z (OCoLC)505066955 |z (OCoLC)648164152 |z (OCoLC)712975861 |z (OCoLC)961693624 |z (OCoLC)962720345 |z (OCoLC)966388440 |z (OCoLC)984814069 |z (OCoLC)988536332 |z (OCoLC)991992535 |z (OCoLC)1034946074 |z (OCoLC)1037696882 |z (OCoLC)1038700042 |z (OCoLC)1055385369 |z (OCoLC)1060191978 |z (OCoLC)1062915264 |z (OCoLC)1081241280 |z (OCoLC)1114385502 |z (OCoLC)1153523345 |z (OCoLC)1179804891 |z (OCoLC)1194831389 |z (OCoLC)1228585104 |z (OCoLC)1331423823 | ||
037 | |a 113041:113129 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a HV8079.C65 |b K68 2006eb | |
072 | 7 | |a LAW |x 041000 |2 bisacsh | |
082 | 7 | |a 363.25/968 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Kovacich, Gerald L. |0 http://id.loc.gov/authorities/names/no98094583 | |
245 | 1 | 0 | |a High-technology crime investigator's handbook : |b establishing and managing a high-technology crime prevention program / |c Gerald L. Kovacich and Andy Jones. |
250 | |a 2nd ed. | ||
260 | |a Amsterdam ; |a Boston : |b Butterworth-Heinemann/Elsevier, |c ©2006. | ||
300 | |a 1 online resource (xxvii, 470 pages) : |b illustrations, map | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a text file |2 rdaft |0 http://rdaregistry.info/termList/fileType/1002 | ||
520 | |a The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers. | ||
505 | 0 | |a SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts. | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Criminal investigation. |0 http://id.loc.gov/authorities/subjects/sh85034045 | |
650 | 0 | |a High technology. |0 http://id.loc.gov/authorities/subjects/sh85060747 | |
650 | 6 | |a Enquêtes criminelles. | |
650 | 6 | |a Technologie de pointe. | |
650 | 7 | |a LAW |x Forensic Science. |2 bisacsh | |
650 | 7 | |a Criminal investigation |2 fast | |
650 | 7 | |a High technology |2 fast | |
655 | 7 | |a dissertations. |2 aat | |
655 | 7 | |a Academic theses |2 fast | |
655 | 7 | |a Academic theses. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026039 | |
655 | 7 | |a Thèses et écrits académiques. |2 rvmgf | |
700 | 1 | |a Jones, Andy, |d 1952- |1 https://id.oclc.org/worldcat/entity/E39PBJtrRTg8GDywXKTK83dWjC | |
776 | 0 | 8 | |i Print version: |a Kovacich, Gerald L. |t High-technology crime investigator's handbook. |b 2nd ed. |d Amsterdam ; Boston : Butterworth-Heinemann/Elsevier, ©2006 |z 0750679298 |z 9780750679299 |w (DLC) 2006004111 |w (OCoLC)63680026 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187426 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780750679299 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00066999 | ||
938 | |a ebrary |b EBRY |n ebr10167093 | ||
938 | |a EBSCOhost |b EBSC |n 187426 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 96255 | ||
938 | |a YBP Library Services |b YANK |n 2543592 | ||
938 | |a Internet Archive |b INAR |n hightechnologycr0000kova_2edi | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162593811 |
---|---|
_version_ | 1816881652576550913 |
adam_text | |
any_adam_object | |
author | Kovacich, Gerald L. |
author2 | Jones, Andy, 1952- |
author2_role | |
author2_variant | a j aj |
author_GND | http://id.loc.gov/authorities/names/no98094583 |
author_facet | Kovacich, Gerald L. Jones, Andy, 1952- |
author_role | |
author_sort | Kovacich, Gerald L. |
author_variant | g l k gl glk |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 K68 2006eb |
callnumber-search | HV8079.C65 K68 2006eb |
callnumber-sort | HV 48079 C65 K68 42006EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts. |
ctrlnum | (OCoLC)162593811 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07681cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162593811</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070806s2006 ne ab ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2006004111</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">UBY</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">STF</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VNS</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BOL</subfield><subfield code="d">BRF</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">KSU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">EZC</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">122380044</subfield><subfield code="a">154684578</subfield><subfield code="a">441774376</subfield><subfield code="a">505066955</subfield><subfield code="a">648164152</subfield><subfield code="a">712975861</subfield><subfield code="a">961693624</subfield><subfield code="a">962720345</subfield><subfield code="a">966388440</subfield><subfield code="a">984814069</subfield><subfield code="a">988536332</subfield><subfield code="a">991992535</subfield><subfield code="a">1034946074</subfield><subfield code="a">1037696882</subfield><subfield code="a">1038700042</subfield><subfield code="a">1055385369</subfield><subfield code="a">1060191978</subfield><subfield code="a">1062915264</subfield><subfield code="a">1081241280</subfield><subfield code="a">1114385502</subfield><subfield code="a">1153523345</subfield><subfield code="a">1179804891</subfield><subfield code="a">1194831389</subfield><subfield code="a">1228585104</subfield><subfield code="a">1331423823</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750679299</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750679298</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080468204</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080468209</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162593811</subfield><subfield code="z">(OCoLC)122380044</subfield><subfield code="z">(OCoLC)154684578</subfield><subfield code="z">(OCoLC)441774376</subfield><subfield code="z">(OCoLC)505066955</subfield><subfield code="z">(OCoLC)648164152</subfield><subfield code="z">(OCoLC)712975861</subfield><subfield code="z">(OCoLC)961693624</subfield><subfield code="z">(OCoLC)962720345</subfield><subfield code="z">(OCoLC)966388440</subfield><subfield code="z">(OCoLC)984814069</subfield><subfield code="z">(OCoLC)988536332</subfield><subfield code="z">(OCoLC)991992535</subfield><subfield code="z">(OCoLC)1034946074</subfield><subfield code="z">(OCoLC)1037696882</subfield><subfield code="z">(OCoLC)1038700042</subfield><subfield code="z">(OCoLC)1055385369</subfield><subfield code="z">(OCoLC)1060191978</subfield><subfield code="z">(OCoLC)1062915264</subfield><subfield code="z">(OCoLC)1081241280</subfield><subfield code="z">(OCoLC)1114385502</subfield><subfield code="z">(OCoLC)1153523345</subfield><subfield code="z">(OCoLC)1179804891</subfield><subfield code="z">(OCoLC)1194831389</subfield><subfield code="z">(OCoLC)1228585104</subfield><subfield code="z">(OCoLC)1331423823</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">113041:113129</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">K68 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">041000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kovacich, Gerald L.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no98094583</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">High-technology crime investigator's handbook :</subfield><subfield code="b">establishing and managing a high-technology crime prevention program /</subfield><subfield code="c">Gerald L. Kovacich and Andy Jones.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Butterworth-Heinemann/Elsevier,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvii, 470 pages) :</subfield><subfield code="b">illustrations, map</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="g">polychrome.</subfield><subfield code="2">rdacc</subfield><subfield code="0">http://rdaregistry.info/termList/RDAColourContent/1003</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rdaft</subfield><subfield code="0">http://rdaregistry.info/termList/fileType/1002</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034045</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">High technology.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85060747</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Enquêtes criminelles.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de pointe.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Forensic Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">High technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">dissertations.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026039</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Thèses et écrits académiques.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jones, Andy,</subfield><subfield code="d">1952-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtrRTg8GDywXKTK83dWjC</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Kovacich, Gerald L.</subfield><subfield code="t">High-technology crime investigator's handbook.</subfield><subfield code="b">2nd ed.</subfield><subfield code="d">Amsterdam ; Boston : Butterworth-Heinemann/Elsevier, ©2006</subfield><subfield code="z">0750679298</subfield><subfield code="z">9780750679299</subfield><subfield code="w">(DLC) 2006004111</subfield><subfield code="w">(OCoLC)63680026</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187426</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780750679299</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00066999</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10167093</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">187426</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">96255</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2543592</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">hightechnologycr0000kova_2edi</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf |
genre_facet | dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
id | ZDB-4-EBA-ocn162593811 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:07Z |
institution | BVB |
isbn | 9780750679299 0750679298 9780080468204 0080468209 |
language | English |
lccn | 2006004111 |
oclc_num | 162593811 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxvii, 470 pages) : illustrations, map |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Butterworth-Heinemann/Elsevier, |
record_format | marc |
spelling | Kovacich, Gerald L. http://id.loc.gov/authorities/names/no98094583 High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program / Gerald L. Kovacich and Andy Jones. 2nd ed. Amsterdam ; Boston : Butterworth-Heinemann/Elsevier, ©2006. 1 online resource (xxvii, 470 pages) : illustrations, map text txt rdacontent computer c rdamedia online resource cr rdacarrier polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 text file rdaft http://rdaregistry.info/termList/fileType/1002 The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers. SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts. Includes bibliographical references and index. Print version record. Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 High technology. http://id.loc.gov/authorities/subjects/sh85060747 Enquêtes criminelles. Technologie de pointe. LAW Forensic Science. bisacsh Criminal investigation fast High technology fast dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf Jones, Andy, 1952- https://id.oclc.org/worldcat/entity/E39PBJtrRTg8GDywXKTK83dWjC Print version: Kovacich, Gerald L. High-technology crime investigator's handbook. 2nd ed. Amsterdam ; Boston : Butterworth-Heinemann/Elsevier, ©2006 0750679298 9780750679299 (DLC) 2006004111 (OCoLC)63680026 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187426 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780750679299 Volltext |
spellingShingle | Kovacich, Gerald L. High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program / SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV -- High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts. Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 High technology. http://id.loc.gov/authorities/subjects/sh85060747 Enquêtes criminelles. Technologie de pointe. LAW Forensic Science. bisacsh Criminal investigation fast High technology fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85034045 http://id.loc.gov/authorities/subjects/sh85060747 http://id.loc.gov/authorities/genreForms/gf2014026039 |
title | High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program / |
title_auth | High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program / |
title_exact_search | High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program / |
title_full | High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program / Gerald L. Kovacich and Andy Jones. |
title_fullStr | High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program / Gerald L. Kovacich and Andy Jones. |
title_full_unstemmed | High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program / Gerald L. Kovacich and Andy Jones. |
title_short | High-technology crime investigator's handbook : |
title_sort | high technology crime investigator s handbook establishing and managing a high technology crime prevention program |
title_sub | establishing and managing a high-technology crime prevention program / |
topic | Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 High technology. http://id.loc.gov/authorities/subjects/sh85060747 Enquêtes criminelles. Technologie de pointe. LAW Forensic Science. bisacsh Criminal investigation fast High technology fast |
topic_facet | Criminal investigation. High technology. Enquêtes criminelles. Technologie de pointe. LAW Forensic Science. Criminal investigation High technology dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187426 https://www.sciencedirect.com/science/book/9780750679299 |
work_keys_str_mv | AT kovacichgeraldl hightechnologycrimeinvestigatorshandbookestablishingandmanagingahightechnologycrimepreventionprogram AT jonesandy hightechnologycrimeinvestigatorshandbookestablishingandmanagingahightechnologycrimepreventionprogram |