LEADER 05430nam 2200661 450 001 9910453711403321 005 20200520144314.0 010 $a0-12-407929-6 035 $a(CKB)2550000001161478 035 $a(EBL)1115158 035 $a(OCoLC)863821517 035 $a(SSID)ssj0001047147 035 $a(PQKBManifestationID)11992765 035 $a(PQKBTitleCode)TC0001047147 035 $a(PQKBWorkID)11137997 035 $a(PQKB)11696501 035 $a(MiAaPQ)EBC1115158 035 $a(CaSebORM)9780124078178 035 $a(Au-PeEL)EBL1115158 035 $a(CaPaEBR)ebr10808514 035 $a(CaONFJC)MIL544572 035 $a(EXLCZ)992550000001161478 100 $a20131017h20142014 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInvestigating internet crimes $ean introduction to solving crimes in cyberspace /$fTodd Shipley, Art Bowker ; technical editor, Nick Selby 205 $a1 Edition. 210 1$aWaltham, MA :$cSyngress,$d[2014] 210 4$d©2014 215 $a1 online resource (497 p.) 300 $aDescription based upon print version of record. 311 $a0-12-407817-6 311 $a1-306-13321-1 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime 327 $aWhy investigate Internet crime?What is needed to respond to Internet crime?; Continuing investigative problems; Conclusion; Further reading; 2 Internet Criminals; Cybercrime profiling; Inductive profiles; Cybercriminal profiles; Cybersex offenders; Internet harassment; Cyberterrorism and cyberwarfare; Internet Crime Compliant Center; New York Police cyberstalking study; Sex offenders online activities; Capability; Deductive profiling; Conclusion; Further reading; 3 How the Internet Works; A short history of the Internet; The importance of IP addresses; DHCP and assigning addresses 327 $aMAC addressDomain Name System; DNS records; Internet Protocol Version 6; Defining IPv6; Translating IPv6; Ipv4-Mapped IPv6 addresses; IPv6 DUID; The World Wide Web; Uniform resource locators; Domain name registration; Internationalized domain names; Autonomous system number; Other services on the Internet; File transfer protocol; Email or the SMTP; Post Office Protocol; Internet Message Access Protocol; News groups, Usenet, or the Network News Transfer Protocol; Chatting with IRC; Relevant RFCs; Conclusion; Further reading; 4 Collecting Legally Defensible Online Evidence; Defining evidence 327 $aDigital versus online evidenceBuilding a foundation; Investigative planning; Investigative components; Authentication; Privacy; Electronic Communications Privacy Act; Wiretap Act (18 U.S.C. 2510-22); Stored Communications Act (18 U.S.C. 2701-12); The Pen/Trap Statute (18 U.S.C. 3127-27); EU Privacy Directive; Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); Mutual legal assistance; General guidance; Conclusion; Further reading; 5 Documenting Online Evidence; Process for documenting online ESI; Collection; Identification; Protocol/application determination; Collection methodology 327 $aLocation identificationPreservation; Presentation; Tools/techniques for documenting Internet evidence; Save As; Pictures and video; Hashing evidence; Collecting entire websites; Authenticating the collected evidence; Validation of online evidence collection tools; Webcase®; Field collection of online ESI; Making an online evidence field collection USB device; Why use FTK imager?; Field process for using the investigative USB device; Collection from Apple Macintosh; Apples in the field; Apple office collection; Organizing your online ESI; The investigative report; Conclusion; Further reading 327 $a6 Using Online Investigative Tools 330 $a Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a di 606 $aComputer crimes$xInvestigation 608 $aElectronic books. 615 0$aComputer crimes$xInvestigation. 676 $a363.25/968 700 $aShipley$b Todd G$0991875 701 $aBowker$b Art$0991876 701 $aSelby$b Nick$0991877 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453711403321 996 $aInvestigating internet crimes$92269978 997 $aUNINA LEADER 01692nam 2200349Ia 450 001 996396217903316 005 20221108090410.0 035 $a(CKB)4330000000353645 035 $a(EEBO)2240959858 035 $a(OCoLC)12228943 035 $a(EXLCZ)994330000000353645 100 $a19850703d1643 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 13$aAn ordinance of the Lords and Commons assembled in Parliament$b[electronic resource] $ewhereby commissioners are appointed for the prevention of divers practises used of late by merchants and others, to deceive His Majesty and the Parliament of such customes and duties as are due and payable for all such goods and merchandizes, as are imported into, or exported out of this kingdome, and to stay all prohibited goods brought in and carried out contrary to the lawes : for performance whereof, power is hereby given to them, their deputies, factors, or servants, to search all or any cellors, vaults, ships, waterhouses, or other places whatsoever, within the kingdome of England, and dominion of Wales 210 $a[London] $c... Printed for Iohn Wright ...$dIune 2, 1643 215 $a[2], [6] p 300 $aReproduction of original in Thomason Collection, British Library. 330 $aeebo-0158 606 $aCustoms administration$zEngland 606 $aInternal revenue law$zEngland 615 0$aCustoms administration 615 0$aInternal revenue law 801 0$bEAA 801 1$bEAA 801 2$bm/c 801 2$bUMI 801 2$bWaOLN 906 $aBOOK 912 $a996396217903316 996 $aAn ordinance of the Lords and Commons assembled in Parliament$92298865 997 $aUNISA LEADER 02101oam 2200457Ia 450 001 9910697044403321 005 20230902161815.0 035 $a(CKB)5470000002384459 035 $a(OCoLC)231689723 035 $a(EXLCZ)995470000002384459 100 $a20080611d2006 ua 0 101 0 $aeng 135 $aurmn||||a|||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aMarine managed areas$b[electronic resource] $ebest practices for boundary making /$fMarine Boundary Working Group, Federal Geographic Data Committee ; contributors, Suzanne Bass ... [and others] ; editor, Gerald G. Esch ; graphic designer, Frank Ruopoli 210 1$aCharleston, SC :$cU.S. Dept. of Commerce, National Oceanic and Atmospheric Administration, Coastal Services Center,$d[2006] 215 $a1 online resource (66 pages) $cillustrations, maps (some color) 300 $aTitle from title screen (viewed on June 11, 2008). 300 $a"June 2006"--1st prelim. p. 300 $a"Coordination and funding of the printing of this publication were provided by the National Oceanic and Atmospheric Administration (NOAA)"--Acknowledgments. 320 $aIncludes bibliographical references (pages 59-63). 517 $aMarine managed areas 606 $aMarine parks and reserves$zUnited States$xManagement$vHandbooks, manuals, etc 606 $aMarine resources conservation$zUnited States$xManagement$vHandbooks, manuals, etc 606 $aBoundaries$vHandbooks, manuals, etc 608 $aHandbooks and manuals.$2lcgft 615 0$aMarine parks and reserves$xManagement 615 0$aMarine resources conservation$xManagement 615 0$aBoundaries 701 $aEsch$b Gerald G$01396616 712 02$aUnited States.$bFederal Geographic Data Committee.$bMarine Boundary Working Group. 712 02$aUnited States.$bNational Oceanic and Atmospheric Administration. 801 0$bEJB 801 1$bEJB 801 2$bGPO 906 $aBOOK 912 $a9910697044403321 996 $aMarine managed areas$93457031 997 $aUNINA