LEADER 05369nam 2200649 a 450 001 9910458824303321 005 20200520144314.0 010 $a1-281-06022-4 010 $a9786611060220 010 $a0-08-055363-X 024 1 $a792502913307 035 $a(CKB)1000000000383548 035 $a(EBL)318404 035 $a(OCoLC)162131558 035 $a(SSID)ssj0000134249 035 $a(PQKBManifestationID)11157540 035 $a(PQKBTitleCode)TC0000134249 035 $a(PQKBWorkID)10047826 035 $a(PQKB)10173445 035 $a(MiAaPQ)EBC318404 035 $a(CaSebORM)9781597491334 035 $a(Au-PeEL)EBL318404 035 $a(CaPaEBR)ebr10201894 035 $a(CaONFJC)MIL106022 035 $a(EXLCZ)991000000000383548 100 $a20070426d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber crime investigations$b[electronic resource] $ebridging the gaps between security professionals, law enforcement, and prosecutors /$fAnthony Reyes ... [et. al] 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing$dc2007 215 $a1 online resource (433 p.) 300 $aIncludes index. 311 $a1-59749-133-0 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors; Copyright Page; Contents; Chapter 1. The Problem at Hand; Introduction; The Gaps in Cyber Crime Law; Unveiling the Myths Behind Cyber Crime; Prioritizing Evidence; Setting the Bar Too High; Summary; Works Referenced; Solutions Fast Track; Frequently Asked Questions; Chapter 2. "Computer Crime" Discussed; Introduction; Examining "Computer Crime" Definitions; Dissecting "Computer Crime"; Using Clear Language to Bridge the Gaps; Summary; Works Referenced 327 $aSolutions Fast TrackFrequently Asked Questions; Chapter 3. Preparing for Prosecution and Testifying; Introduction; Common Misconceptions; Chain of Custody; Keys to Effective Testimony; Differences between Civil and Criminal Cases; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Cyber Investigative Roles; Introduction; Understanding Your Role as a Cyber Crime Investigator; The Role of Law Enforcement Officers; The Role of the Prosecuting Attorney; Summary; Solutions Fast Track; Frequently Asked Questions; Works Referenced 327 $aChapter 5. Incident Response: Live Forensics and InvestigationsIntroduction; Postmortmem versus Live Forensics; Today's Live Methods; Case Study: Live versus Postmortem; Computer Analysis for the Hacker Defender Program; Network Analysis; Summary; Special Thanks; References; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions 327 $aChapter 7. Seizure of Digital InformationIntroduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Conducting Cyber Investigations; Introduction; Demystifying Computer/Cyber Crime; Understanding IP Addresses; The Explosion of Networking; The Explosion of Wireless Networks; Interpersonal Communication 327 $aSummarySolutions Fast Track; Frequently Asked Questions; Chapter 9. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Cyber Crime Prevention; Introduction; Ways to Prevent Cyber Crime Targeted at You; Ways to Prevent Cyber Crime Targeted at the Family; Ways to Prevent Cyber Crime Targeted at Personal Property; Ways to Prevent Cyber Crime Targeted at a Business; Ways to Prevent Cyber Crime Targeted at an Organization 327 $aWays to Prevent Cyber Crime Targeted at a Government Agency 330 $aWritten by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter "What is Cyber Crime?? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not onl 606 $aComputer crimes$xInvestigation 608 $aElectronic books. 615 0$aComputer crimes$xInvestigation. 676 $a363.25/968 700 $aReyes$b Anthony$0880204 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910458824303321 996 $aCyber crime investigations$91965322 997 $aUNINA LEADER 02518nam 2200637Ia 450 001 9910452475803321 005 20200520144314.0 010 $a1-299-38777-2 010 $a0-8108-8637-5 035 $a(CKB)2550000001017474 035 $a(EBL)1157592 035 $a(SSID)ssj0000860287 035 $a(PQKBManifestationID)12384586 035 $a(PQKBTitleCode)TC0000860287 035 $a(PQKBWorkID)10897345 035 $a(PQKB)11660474 035 $a(MiAaPQ)EBC1157592 035 $a(Au-PeEL)EBL1157592 035 $a(CaPaEBR)ebr10683219 035 $a(CaONFJC)MIL470027 035 $a(OCoLC)836848819 035 $a(EXLCZ)992550000001017474 100 $a20121025d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe geography of Central America and Mexico$b[electronic resource] $ea scholarly guide and bibliography /$fThomas A. Rumney 210 $aLanham, MD $cScarecrow Press, Inc.$dc2013 215 $a1 online resource (199 p.) 225 1 $aGeography 300 $aDescription based upon print version of record. 311 $a0-8108-8636-7 320 $aIncludes bibliographical references and index. 327 $aContents; Introduction; List of Journals Used; 1 The Region as a Whole; 2 Belize; 3 Costa Rica; 4 El Salvador; 5 Guatemala; 6 Honduras; 7 Mexico; 8 Nicaragua; 9 Panama; Author Index; About the Author 330 $aThe Geography of Central America and Mexico: A Scholarly Guide and Bibliography by Thomas A. Rumney collects, organizes, and presents as many of these scholarly publications as possible to help and encourage efforts in the teaching, study, and continuing scholarship of the geography of this area, which covers Mexico, Belize, Guatemala, Honduras, El Salvador, Nicaragua, Costa Rica, and Panama, as well as the region as a whole. 410 0$aGeography 606 $aGeography$zCentral America 606 $aGeography$zMexico 607 $aMexico$xGeography 607 $aCentral America$xGeography 607 $aMexico$xGeography$vBibilography 607 $aCentral America$xGeography$vBibliography 608 $aElectronic books. 615 0$aGeography 615 0$aGeography 676 $a917.2 700 $aRumney$b Thomas A$0859168 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452475803321 996 $aThe geography of Central America and Mexico$91917575 997 $aUNINA LEADER 01337nam a2200265 a 4500 001 991003897139707536 008 201030s 000 0 mul d 020 $a9791091460330 035 $ab1440543x-39ule_inst 040 $aBibl. Dip.le Aggr. Studi Umanistici$bita 245 10$aAtti del 28. Congresso internazionale di linguistica e filologia romanza : (Roma, 18-23 luglio 2016) / Roberto Antonelli, Paul Videsott e Martin Glessgen 260 $aStrasbourg : Eliphi, 2018 300 $a2 volumi ; 25 cm 490 0 $aBibliothèque de linguistique romane ; 15 650 4$aCongresso internazionale di linguistica e filologia romanza <28.; 2016; Roma> 700 $aGlessgen, Martin 700 $aVidesott, Paul 700 $aAntonelli, Roberto 907 $a.b1440543x$b30-10-20$c30-10-20 912 $a991003897139707536 945 $aLE008 FL.M. (f.r.) XL 526/15.1$cv. 1$g1$i2008000600242$lle008$nLE008 Aprile 2020$op$pE90.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i15940561$z30-10-20 945 $aLE008 FL.M. (f.r.) XL 526/15.2$cv. 2$g1$i2008000600259$lle008$nLE008 Aprile 2020$op$pE90.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i15940573$z30-10-20 996 $aAtti del 28. Congresso internazionale di linguistica e filologia romanza : (Roma, 18-23 luglio 2016)$91769541 997 $aUNISALENTO 998 $ale008$b30-10-20$cm$da $e-$fmul$gfr $h0$i0