03455nam a2200445Ii 4500991003258209707536m d cr cn|||||||||070806s2002 maua s 001 0 eng d97819318366541931836655b13656466-39ule_inst100750:100757Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSTEFA005.822Shinder, Debra Littlejohn.627588Scene of the cybercrime[electronic resource] :computer forensics handbook /Debra Littlejohn Shinder ; Ed Tittel, editor.Rockland, MA :Syngress Pub.,c2002.xxxi, 718 p. :ill. ;24 cm.Includes index.Chapter 1: Introduction -- Chapter 2: The Rise of Cybercrime -- Chapter 3: Understanding the Cybercriminal Mindset -- Chapter 4: Understanding Computer and Networking Basics -- Chapter 5: Understanding Network Intrusions and Attacks -- Chapter 6: Understanding Cybercrime Prevention -- Chapter 7: Understanding Windows Security Features -- Chapter 8: Understanding Cybercrime Detection -- Chapter 9: Collecting and Preserving Digital Evidence -- Chapter 10: Building the Cybercrime Case -- Chapter 11: Conclusion."Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Computer security.Computer networksSecurity measures.Computer crimesInvestigation.Forensic sciences.Computercriminaliteit.gttCriminalistiek.gttElectronic books.localTittel, Ed.Original19318366559781931836654(OCoLC)51036906Referexhttp://www.sciencedirect.com/science/book/9781931836654An electronic book accessible through the World Wide Web; click for information.b1365646624-02-2224-01-08991003258209707536C0TEFScene of the cybercrime1212958UNISALENTOle02924-01-08mm -engmau00