Amazon cover image
Image from Amazon.com

Computer forensics : cybercriminals, laws, and evidence / Marie-Helen Maras, PhD, Associate Professor, John Jay College of Criminal Justice.

By: Material type: TextPublication details: Burlington, MA : Jones & Bartlett Learning, 2015.Edition: Second editionDescription: xv, 408 pages : illustrations, forms ; 23 cmISBN:
  • 9781449692223
  • 1449692222
Subject(s): DDC classification:
  • 363.25/9680973 23
LOC classification:
  • KF8947 .M37 2015
Contents:
1. Entering the world of cybercrime -- Cybercrime : defined -- Cybercrime versus traditional crime -- Cybercrime categories -- Combating cybercrime -- 2. An introduction to computer forensics investigations and electronic evidence -- Computer forensics : what is it? -- Computer forensics investigations : the basics -- Computer forensics investigations : a four-step process -- Electronic evidence : what is it? -- Types of evidence -- Authentication of evidence -- Standards of evidence -- 3. Laws regulating access to electronic evidence -- Telecommunications and electronic communications data -- The statutory background of privacy protection and government access to data -- 4. Searches and seizures of computers and electronic evidence -- What is privacy and why is it important? -- Constitutional source of privacy protection : the Fourth Amendment -- Search warrants -- Searching a computer for evidence -- 5. Cybercrime laws : which statute for which crime? -- Computer threats and intrusions -- Financial crimes and fraud -- Intellectual property theft and economic espionage -- Personal crimes -- 6. Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- The art of deceiving : social engineering -- Scams and scam artists -- Identity theft -- Cyberbullying -- Child exploitation online -- 7. Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Defining cyberterrorism -- Criminalizing cyberterrorism -- combating cyberterrorism -- 8. Where is the electronic evidence and which tools can we use to find it? -- The location of electronic evidence -- Tools used to search and collect electronic evidence -- 9. Crime and incident scene : what should an investigator do? -- Conducting an investigation -- Special considerations for cybercrime investigations -- Identifying evidence -- Analysis of evidence -- How to handle evidence in an investigation -- Hypothetical criminal investigation -- Extracting electronic evidence -- 10. Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- Corporate investigations -- Corporate criminal activities and policy violations -- Preparing for the investigation -- Conducting the investigation -- 11. E-mail forensics -- The importance of email investigations -- Email : the basics -- How to conduct an email investigation -- Problems encountered by computer forensics investigators -- 12. Network forensics : an introduction -- Stand-alone versus networked devices -- Computer networks -- Network components -- Where can network-related evidence be found? -- Network forensics analysis tools -- Special issues when conducting investigations in a networked environment -- Preliminary analysis -- Documentation and collection -- Analysis and preservation -- 13. Mobile devices in computer forensics investigations -- Role of mobile devices -- Mobile phones and PDAs versus other electronic devices -- which tools can be used to retrieve evidence? -- Mobile device investigations -- 14. The pretrial and courtroom experiences of a computer forensics investigator -- Pretrial procedures -- Testimony and rules of evidence -- The role of the computer forensics investigator in pretrial proceedings and court.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Books African Court on Human and Peoples' Rights Library KF8947 .M37 2015 (Browse shelf(Opens below)) Available 10208585

Includes bibliographical references and index.

1. Entering the world of cybercrime -- Cybercrime : defined -- Cybercrime versus traditional crime -- Cybercrime categories -- Combating cybercrime -- 2. An introduction to computer forensics investigations and electronic evidence -- Computer forensics : what is it? -- Computer forensics investigations : the basics -- Computer forensics investigations : a four-step process -- Electronic evidence : what is it? -- Types of evidence -- Authentication of evidence -- Standards of evidence -- 3. Laws regulating access to electronic evidence -- Telecommunications and electronic communications data -- The statutory background of privacy protection and government access to data -- 4. Searches and seizures of computers and electronic evidence -- What is privacy and why is it important? -- Constitutional source of privacy protection : the Fourth Amendment -- Search warrants -- Searching a computer for evidence -- 5. Cybercrime laws : which statute for which crime? -- Computer threats and intrusions -- Financial crimes and fraud -- Intellectual property theft and economic espionage -- Personal crimes -- 6. Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- The art of deceiving : social engineering -- Scams and scam artists -- Identity theft -- Cyberbullying -- Child exploitation online -- 7. Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Defining cyberterrorism -- Criminalizing cyberterrorism -- combating cyberterrorism -- 8. Where is the electronic evidence and which tools can we use to find it? -- The location of electronic evidence -- Tools used to search and collect electronic evidence -- 9. Crime and incident scene : what should an investigator do? -- Conducting an investigation -- Special considerations for cybercrime investigations -- Identifying evidence -- Analysis of evidence -- How to handle evidence in an investigation -- Hypothetical criminal investigation -- Extracting electronic evidence -- 10. Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- Corporate investigations -- Corporate criminal activities and policy violations -- Preparing for the investigation -- Conducting the investigation -- 11. E-mail forensics -- The importance of email investigations -- Email : the basics -- How to conduct an email investigation -- Problems encountered by computer forensics investigators -- 12. Network forensics : an introduction -- Stand-alone versus networked devices -- Computer networks -- Network components -- Where can network-related evidence be found? -- Network forensics analysis tools -- Special issues when conducting investigations in a networked environment -- Preliminary analysis -- Documentation and collection -- Analysis and preservation -- 13. Mobile devices in computer forensics investigations -- Role of mobile devices -- Mobile phones and PDAs versus other electronic devices -- which tools can be used to retrieve evidence? -- Mobile device investigations -- 14. The pretrial and courtroom experiences of a computer forensics investigator -- Pretrial procedures -- Testimony and rules of evidence -- The role of the computer forensics investigator in pretrial proceedings and court.

There are no comments on this title.

to post a comment.

African Court on Human and Peoples' Rights | For Inquiries Contact » +255 272 510 510