LEADER 06100oam 2200805 450 001 9910458578403321 005 20210514164917.0 010 $a0-12-800811-3 035 $a(CKB)2550000001331888 035 $a(EBL)1744499 035 $a(OCoLC)884646450 035 $a(SSID)ssj0001398958 035 $a(PQKBManifestationID)11779211 035 $a(PQKBTitleCode)TC0001398958 035 $a(PQKBWorkID)11446756 035 $a(PQKB)10293864 035 $a(MiAaPQ)EBC1744499 035 $a(CaSebORM)9780128007433 035 $a(Au-PeEL)EBL1744499 035 $a(CaPaEBR)ebr10896655 035 $a(CaONFJC)MIL628984 035 $a(OCoLC)889268705 035 $a(EXLCZ)992550000001331888 100 $a20140731h20142014 uy 0 101 0 $aeng 135 $aurcn#---uuuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCyber crime and cyber terrorism investigator's handbook /$fedited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress, an imprint of Elsevier,$d[2014]. 210 4$dİ2014 215 $a1 online resource (xxiii, 282 pages) $cillustrations 300 $aDescription based upon print version of record. 311 $a0-12-800743-5 311 $a1-306-97733-9 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction 327 $aSome Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References 327 $aChapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture 327 $aVerification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services 327 $aIntrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders 327 $aRecovering Deleted Partitions 330 $aCyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many 606 $aComputer crimes$xInvestigation 606 $aCyberterrorism$xInvestigation 606 $aComputer crimes$xInvestigation$vCase studies 606 $aCyberterrorism$xInvestigation$vCase studies 608 $aElectronic books. 615 0$aComputer crimes$xInvestigation. 615 0$aCyberterrorism$xInvestigation. 615 0$aComputer crimes$xInvestigation 615 0$aCyberterrorism$xInvestigation 676 $a363.25/968 702 $aAkhgar$b Babak 702 $aStaniforth$b Andrew 702 $aBosco$b Francesca M. 702 $aElliot$b Steve 702 $aRearick$b Benjamin 702 $aKumaraguruparan$b Priya 702 $aRogers$b Mark 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 801 2$bStDnUAD 906 $aBOOK 912 $a9910458578403321 996 $aCyber crime and cyber terrorism investigator's handbook$92199376 997 $aUNINA