| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910453711403321 |
|
|
Autore |
Shipley Todd G |
|
|
Titolo |
Investigating internet crimes : an introduction to solving crimes in cyberspace / / Todd Shipley, Art Bowker ; technical editor, Nick Selby |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Waltham, MA : , : Syngress, , [2014] |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1 Edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (497 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer crimes - Investigation |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime |
Why investigate Internet crime?What is needed to respond to Internet crime?; Continuing investigative problems; Conclusion; Further reading; 2 Internet Criminals; Cybercrime profiling; Inductive profiles; Cybercriminal profiles; Cybersex offenders; Internet harassment; Cyberterrorism and cyberwarfare; Internet Crime Compliant Center; New York Police cyberstalking study; Sex offenders online activities; Capability; Deductive profiling; Conclusion; Further reading; 3 How the Internet Works; A short history of the Internet; The importance of IP addresses; DHCP and assigning addresses |
MAC addressDomain Name System; DNS records; Internet Protocol Version 6; Defining IPv6; Translating IPv6; Ipv4-Mapped IPv6 addresses; IPv6 DUID; The World Wide Web; Uniform resource locators; |
|
|
|
|
|
|
|
|
|
|
|
Domain name registration; Internationalized domain names; Autonomous system number; Other services on the Internet; File transfer protocol; Email or the SMTP; Post Office Protocol; Internet Message Access Protocol; News groups, Usenet, or the Network News Transfer Protocol; Chatting with IRC; Relevant RFCs; Conclusion; Further reading; 4 Collecting Legally Defensible Online Evidence; Defining evidence |
Digital versus online evidenceBuilding a foundation; Investigative planning; Investigative components; Authentication; Privacy; Electronic Communications Privacy Act; Wiretap Act (18 U.S.C. 2510-22); Stored Communications Act (18 U.S.C. 2701-12); The Pen/Trap Statute (18 U.S.C. 3127-27); EU Privacy Directive; Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); Mutual legal assistance; General guidance; Conclusion; Further reading; 5 Documenting Online Evidence; Process for documenting online ESI; Collection; Identification; Protocol/application determination; Collection methodology |
Location identificationPreservation; Presentation; Tools/techniques for documenting Internet evidence; Save As; Pictures and video; Hashing evidence; Collecting entire websites; Authenticating the collected evidence; Validation of online evidence collection tools; Webcase®; Field collection of online ESI; Making an online evidence field collection USB device; Why use FTK imager?; Field process for using the investigative USB device; Collection from Apple Macintosh; Apples in the field; Apple office collection; Organizing your online ESI; The investigative report; Conclusion; Further reading |
6 Using Online Investigative Tools |
|
|
|
|
|
|
Sommario/riassunto |
|
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a di |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996396217903316 |
|
|
Titolo |
An ordinance of the Lords and Commons assembled in Parliament [[electronic resource] ] : whereby commissioners are appointed for the prevention of divers practises used of late by merchants and others, to deceive His Majesty and the Parliament of such customes and duties as are due and payable for all such goods and merchandizes, as are imported into, or exported out of this kingdome, and to stay all prohibited goods brought in and carried out contrary to the lawes : for performance whereof, power is hereby given to them, their deputies, factors, or servants, to search all or any cellors, vaults, ships, waterhouses, or other places whatsoever, within the kingdome of England, and dominion of Wales |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[London], : ... Printed for Iohn Wright ..., Iune 2, 1643 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
Customs administration - England |
Internal revenue law - England |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Reproduction of original in Thomason Collection, British Library. |
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
| |