| 000 | 04549cam a2200373 i 4500 | ||
|---|---|---|---|
| 999 |
_c5556 _d5556 |
||
| 001 | ocn868000190 | ||
| 003 | OCoLC | ||
| 005 | 20200421131048.0 | ||
| 008 | 140110s2015 mauak b 001 0 eng | ||
| 010 | _a 2013048189 | ||
| 020 |
_a9781449692223 _q(pbk.) |
||
| 020 |
_a1449692222 _q(pbk.) |
||
| 029 | 1 |
_aAU@ _b000052401413 |
|
| 035 | _a(OCoLC)868000190 | ||
| 040 |
_aDLC _beng _erda _cTZ-ArACH |
||
| 042 | _apcc | ||
| 043 | _an-us--- | ||
| 049 | _aTZAA | ||
| 050 | 0 | 0 |
_aKF8947 _b.M37 2015 |
| 082 | 0 | 0 |
_a363.25/9680973 _223 |
| 100 | 1 |
_aMaras, Marie-Helen, _d1979- _eauthor. |
|
| 245 | 1 | 0 |
_aComputer forensics : _bcybercriminals, laws, and evidence / _cMarie-Helen Maras, PhD, Associate Professor, John Jay College of Criminal Justice. |
| 250 | _aSecond edition. | ||
| 260 |
_aBurlington, MA : _bJones & Bartlett Learning, _c 2015. |
||
| 300 |
_axv, 408 pages : _billustrations, forms ; _c23 cm |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _a1. Entering the world of cybercrime -- Cybercrime : defined -- Cybercrime versus traditional crime -- Cybercrime categories -- Combating cybercrime -- 2. An introduction to computer forensics investigations and electronic evidence -- Computer forensics : what is it? -- Computer forensics investigations : the basics -- Computer forensics investigations : a four-step process -- Electronic evidence : what is it? -- Types of evidence -- Authentication of evidence -- Standards of evidence -- 3. Laws regulating access to electronic evidence -- Telecommunications and electronic communications data -- The statutory background of privacy protection and government access to data -- 4. Searches and seizures of computers and electronic evidence -- What is privacy and why is it important? -- Constitutional source of privacy protection : the Fourth Amendment -- Search warrants -- Searching a computer for evidence -- 5. Cybercrime laws : which statute for which crime? -- Computer threats and intrusions -- Financial crimes and fraud -- Intellectual property theft and economic espionage -- Personal crimes -- 6. Understanding the computer-networking environment : beware of the scam artists, bullies, and lurking predators! -- The art of deceiving : social engineering -- Scams and scam artists -- Identity theft -- Cyberbullying -- Child exploitation online -- 7. Cyberterrorism : what it is, what it isn't, why it matters, and what to do about it -- Defining cyberterrorism -- Criminalizing cyberterrorism -- combating cyberterrorism -- 8. Where is the electronic evidence and which tools can we use to find it? -- The location of electronic evidence -- Tools used to search and collect electronic evidence -- 9. Crime and incident scene : what should an investigator do? -- Conducting an investigation -- Special considerations for cybercrime investigations -- Identifying evidence -- Analysis of evidence -- How to handle evidence in an investigation -- Hypothetical criminal investigation -- Extracting electronic evidence -- 10. Corporate crimes and policy violations involving computers : how to conduct a corporate investigation -- Corporate investigations -- Corporate criminal activities and policy violations -- Preparing for the investigation -- Conducting the investigation -- 11. E-mail forensics -- The importance of email investigations -- Email : the basics -- How to conduct an email investigation -- Problems encountered by computer forensics investigators -- 12. Network forensics : an introduction -- Stand-alone versus networked devices -- Computer networks -- Network components -- Where can network-related evidence be found? -- Network forensics analysis tools -- Special issues when conducting investigations in a networked environment -- Preliminary analysis -- Documentation and collection -- Analysis and preservation -- 13. Mobile devices in computer forensics investigations -- Role of mobile devices -- Mobile phones and PDAs versus other electronic devices -- which tools can be used to retrieve evidence? -- Mobile device investigations -- 14. The pretrial and courtroom experiences of a computer forensics investigator -- Pretrial procedures -- Testimony and rules of evidence -- The role of the computer forensics investigator in pretrial proceedings and court. | |
| 650 | 0 |
_aElectronic evidence _zUnited States. |
|
| 650 | 0 |
_aComputer crimes _xInvestigation _zUnited States. |
|
| 650 | 7 |
_aComputer crimes _xInvestigation. _2fast |
|
| 650 | 7 |
_aElectronic evidence. _2fast |
|
| 651 | 7 |
_aUnited States. _2fast |
|
| 942 |
_2lcc _cBOOK |
||