Investigating Computer Crime
Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the world, it contains an incredible amount of practical, directly applicable information. It foll...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1340 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1340 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-13402009-11-27T08:36:46Z Investigating Computer Crime Clark, Frank Diliberto, Ken Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the world, it contains an incredible amount of practical, directly applicable information. It follows a step-by-step approach to the investigation, seizure, and evaluation of computer evidence. The material in the book has been used at the Federal Law Enforcement Training Center and the Canadian Police College for teaching computer classes in white collar crime and sex crime investigations and by U.S. Army Intelligence in cooperation with NATO in Europe. It has also been used to teach a one-week course in computer crime investigation to agents from the IRS, Secret Service, and state and local agencies. Computers reach into every aspect of our lives today, and as their use grows, so does the possibility of their abuse. This book is directly applicable and useful to virtually everyone working in all aspects of law enforcement. From attorneys to police investigators, from judges to students of criminology, this book guides you step-by-step through computer crime investigation. Don't be without this powerful tool for fighting this new form of crime. Computer Search Warrant Team * Case Supervisor * Interview Team * Sketch and Photo Team * Physical Search Team * Security and Arrest Team * Technical Evidence Seizure and Logging Team Computer-Related Evidence * Types of Computer-Related Evidence * Where Computer-Related Evidence May be Found * Finding Computer Evidence * Examine the Evidence for Criminal Content * Cautions and Considerations * Legal Requirements * Storage of Seized Evidence Investigative Tool Box * Software * Hardware * Other Useful Stuff Crime Scene Investigation * Evaluate the Scene in Advance * Set Up Search Teams * Establish a Plan of Attack * Prepare the Search Warrant * Execute the Warrant * Secure the Scene * Teams Perform their Functions * Completing the Search Making a Boot Disk * What is a Boot Disk? * The POST Test * The Boot Process * What if there is a CMOS Boot Password? * So, How Do I Make One? * What Problems Might I Encounter? Simple Overview of Seizing a Computer Evidence Evaluation and Analysis * Forms of Evidence * Analysis Tools * Analysis Procedures using PROFILE.BAT * Other Analysis Procedures * Chronological Search Form Investigating Floppies Common File Extensions Passwords and Encryption * What is a Password? * What is Encryption? * What is the Difference Between Passwords and Encryption? * What are Common Uses of Passwords? * Where Do You Get a Password? * How Do You Break or Bypass a Password or Encryption? * How Do You Break or Bypass Encryption? * PGP * What is a Common Use of Encryption? * Sources of Programs and Information Investigating Bulletin Boards * Where Do I Start? * Initiating the Investigation * Tips to Avoid Traps, Snares, and Pitfalls "Elite" Acronyms Networks * Network Ups and Downs * Network Parts and Pieces * Types of Networks * Physical Connections * Operating Systems * So What Does this All Mean? * The Bottom Line Ideal Investigative Computer Systems * Desktop * Portable * Tools * Computer Chart * Media * Cables * Bags * Software Court Procedures * Expert Witnesses * Pretrial Preparation * Speaking to the Judge and Jury * Terminology to Use in Court * Resumes * Equipment Search Warrants * Case Law * Writing a Warrant * Hacker Case * Prodigy Service Warrant * Credit Card Warrant * Search Warrant Samples Conclusion Glossary 2009-11-27T08:36:46Z 2009-11-27T08:36:46Z 1996 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1340 en CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the world, it contains an incredible amount of practical, directly applicable information. It follows a step-by-step approach to the investigation, seizure, and evaluation of computer evidence.
The material in the book has been used at the Federal Law Enforcement Training Center and the Canadian Police College for teaching computer classes in white collar crime and sex crime investigations and by U.S. Army Intelligence in cooperation with NATO in Europe. It has also been used to teach a one-week course in computer crime investigation to agents from the IRS, Secret Service, and state and local agencies.
Computers reach into every aspect of our lives today, and as their use grows, so does the possibility of their abuse. This book is directly applicable and useful to virtually everyone working in all aspects of law enforcement. From attorneys to police investigators, from judges to students of criminology, this book guides you step-by-step through computer crime investigation. Don't be without this powerful tool for fighting this new form of crime. |
format |
Book |
author |
Clark, Frank Diliberto, Ken |
spellingShingle |
Clark, Frank Diliberto, Ken Investigating Computer Crime |
author_facet |
Clark, Frank Diliberto, Ken |
author_sort |
Clark, Frank |
title |
Investigating Computer Crime |
title_short |
Investigating Computer Crime |
title_full |
Investigating Computer Crime |
title_fullStr |
Investigating Computer Crime |
title_full_unstemmed |
Investigating Computer Crime |
title_sort |
investigating computer crime |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1340 |
_version_ |
1757677645206650880 |