Investigating Computer Crime

Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the world, it contains an incredible amount of practical, directly applicable information. It foll...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Clark, Frank, Diliberto, Ken
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1340
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1340
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-13402009-11-27T08:36:46Z Investigating Computer Crime Clark, Frank Diliberto, Ken Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the world, it contains an incredible amount of practical, directly applicable information. It follows a step-by-step approach to the investigation, seizure, and evaluation of computer evidence. The material in the book has been used at the Federal Law Enforcement Training Center and the Canadian Police College for teaching computer classes in white collar crime and sex crime investigations and by U.S. Army Intelligence in cooperation with NATO in Europe. It has also been used to teach a one-week course in computer crime investigation to agents from the IRS, Secret Service, and state and local agencies. Computers reach into every aspect of our lives today, and as their use grows, so does the possibility of their abuse. This book is directly applicable and useful to virtually everyone working in all aspects of law enforcement. From attorneys to police investigators, from judges to students of criminology, this book guides you step-by-step through computer crime investigation. Don't be without this powerful tool for fighting this new form of crime. Computer Search Warrant Team * Case Supervisor * Interview Team * Sketch and Photo Team * Physical Search Team * Security and Arrest Team * Technical Evidence Seizure and Logging Team Computer-Related Evidence * Types of Computer-Related Evidence * Where Computer-Related Evidence May be Found * Finding Computer Evidence * Examine the Evidence for Criminal Content * Cautions and Considerations * Legal Requirements * Storage of Seized Evidence Investigative Tool Box * Software * Hardware * Other Useful Stuff Crime Scene Investigation * Evaluate the Scene in Advance * Set Up Search Teams * Establish a Plan of Attack * Prepare the Search Warrant * Execute the Warrant * Secure the Scene * Teams Perform their Functions * Completing the Search Making a Boot Disk * What is a Boot Disk? * The POST Test * The Boot Process * What if there is a CMOS Boot Password? * So, How Do I Make One? * What Problems Might I Encounter? Simple Overview of Seizing a Computer Evidence Evaluation and Analysis * Forms of Evidence * Analysis Tools * Analysis Procedures using PROFILE.BAT * Other Analysis Procedures * Chronological Search Form Investigating Floppies Common File Extensions Passwords and Encryption * What is a Password? * What is Encryption? * What is the Difference Between Passwords and Encryption? * What are Common Uses of Passwords? * Where Do You Get a Password? * How Do You Break or Bypass a Password or Encryption? * How Do You Break or Bypass Encryption? * PGP * What is a Common Use of Encryption? * Sources of Programs and Information Investigating Bulletin Boards * Where Do I Start? * Initiating the Investigation * Tips to Avoid Traps, Snares, and Pitfalls "Elite" Acronyms Networks * Network Ups and Downs * Network Parts and Pieces * Types of Networks * Physical Connections * Operating Systems * So What Does this All Mean? * The Bottom Line Ideal Investigative Computer Systems * Desktop * Portable * Tools * Computer Chart * Media * Cables * Bags * Software Court Procedures * Expert Witnesses * Pretrial Preparation * Speaking to the Judge and Jury * Terminology to Use in Court * Resumes * Equipment Search Warrants * Case Law * Writing a Warrant * Hacker Case * Prodigy Service Warrant * Credit Card Warrant * Search Warrant Samples Conclusion Glossary 2009-11-27T08:36:46Z 2009-11-27T08:36:46Z 1996 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1340 en CRC Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the world, it contains an incredible amount of practical, directly applicable information. It follows a step-by-step approach to the investigation, seizure, and evaluation of computer evidence. The material in the book has been used at the Federal Law Enforcement Training Center and the Canadian Police College for teaching computer classes in white collar crime and sex crime investigations and by U.S. Army Intelligence in cooperation with NATO in Europe. It has also been used to teach a one-week course in computer crime investigation to agents from the IRS, Secret Service, and state and local agencies. Computers reach into every aspect of our lives today, and as their use grows, so does the possibility of their abuse. This book is directly applicable and useful to virtually everyone working in all aspects of law enforcement. From attorneys to police investigators, from judges to students of criminology, this book guides you step-by-step through computer crime investigation. Don't be without this powerful tool for fighting this new form of crime.
format Book
author Clark, Frank
Diliberto, Ken
spellingShingle Clark, Frank
Diliberto, Ken
Investigating Computer Crime
author_facet Clark, Frank
Diliberto, Ken
author_sort Clark, Frank
title Investigating Computer Crime
title_short Investigating Computer Crime
title_full Investigating Computer Crime
title_fullStr Investigating Computer Crime
title_full_unstemmed Investigating Computer Crime
title_sort investigating computer crime
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1340
_version_ 1757677645206650880