top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber crime investigations [[electronic resource] ] : bridging the gaps between security professionals, law enforcement, and prosecutors / / Anthony Reyes ... [et. al]
Cyber crime investigations [[electronic resource] ] : bridging the gaps between security professionals, law enforcement, and prosecutors / / Anthony Reyes ... [et. al]
Autore Reyes Anthony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2007
Descrizione fisica 1 online resource (433 p.)
Disciplina 363.25/968
Soggetto topico Computer crimes - Investigation
Soggetto genere / forma Electronic books.
ISBN 1-281-06022-4
9786611060220
0-08-055363-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors; Copyright Page; Contents; Chapter 1. The Problem at Hand; Introduction; The Gaps in Cyber Crime Law; Unveiling the Myths Behind Cyber Crime; Prioritizing Evidence; Setting the Bar Too High; Summary; Works Referenced; Solutions Fast Track; Frequently Asked Questions; Chapter 2. "Computer Crime" Discussed; Introduction; Examining "Computer Crime" Definitions; Dissecting "Computer Crime"; Using Clear Language to Bridge the Gaps; Summary; Works Referenced
Solutions Fast TrackFrequently Asked Questions; Chapter 3. Preparing for Prosecution and Testifying; Introduction; Common Misconceptions; Chain of Custody; Keys to Effective Testimony; Differences between Civil and Criminal Cases; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Cyber Investigative Roles; Introduction; Understanding Your Role as a Cyber Crime Investigator; The Role of Law Enforcement Officers; The Role of the Prosecuting Attorney; Summary; Solutions Fast Track; Frequently Asked Questions; Works Referenced
Chapter 5. Incident Response: Live Forensics and InvestigationsIntroduction; Postmortmem versus Live Forensics; Today's Live Methods; Case Study: Live versus Postmortem; Computer Analysis for the Hacker Defender Program; Network Analysis; Summary; Special Thanks; References; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions
Chapter 7. Seizure of Digital InformationIntroduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Conducting Cyber Investigations; Introduction; Demystifying Computer/Cyber Crime; Understanding IP Addresses; The Explosion of Networking; The Explosion of Wireless Networks; Interpersonal Communication
SummarySolutions Fast Track; Frequently Asked Questions; Chapter 9. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Cyber Crime Prevention; Introduction; Ways to Prevent Cyber Crime Targeted at You; Ways to Prevent Cyber Crime Targeted at the Family; Ways to Prevent Cyber Crime Targeted at Personal Property; Ways to Prevent Cyber Crime Targeted at a Business; Ways to Prevent Cyber Crime Targeted at an Organization
Ways to Prevent Cyber Crime Targeted at a Government Agency
Record Nr. UNINA-9910458824303321
Reyes Anthony  
Rockland, MA, : Syngress Publishing, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber crime investigations [[electronic resource] ] : bridging the gaps between security professionals, law enforcement, and prosecutors / / Anthony Reyes ... [et. al]
Cyber crime investigations [[electronic resource] ] : bridging the gaps between security professionals, law enforcement, and prosecutors / / Anthony Reyes ... [et. al]
Autore Reyes Anthony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2007
Descrizione fisica 1 online resource (433 p.)
Disciplina 363.25/968
Soggetto topico Computer crimes - Investigation
ISBN 1-281-06022-4
9786611060220
0-08-055363-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors; Copyright Page; Contents; Chapter 1. The Problem at Hand; Introduction; The Gaps in Cyber Crime Law; Unveiling the Myths Behind Cyber Crime; Prioritizing Evidence; Setting the Bar Too High; Summary; Works Referenced; Solutions Fast Track; Frequently Asked Questions; Chapter 2. "Computer Crime" Discussed; Introduction; Examining "Computer Crime" Definitions; Dissecting "Computer Crime"; Using Clear Language to Bridge the Gaps; Summary; Works Referenced
Solutions Fast TrackFrequently Asked Questions; Chapter 3. Preparing for Prosecution and Testifying; Introduction; Common Misconceptions; Chain of Custody; Keys to Effective Testimony; Differences between Civil and Criminal Cases; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Cyber Investigative Roles; Introduction; Understanding Your Role as a Cyber Crime Investigator; The Role of Law Enforcement Officers; The Role of the Prosecuting Attorney; Summary; Solutions Fast Track; Frequently Asked Questions; Works Referenced
Chapter 5. Incident Response: Live Forensics and InvestigationsIntroduction; Postmortmem versus Live Forensics; Today's Live Methods; Case Study: Live versus Postmortem; Computer Analysis for the Hacker Defender Program; Network Analysis; Summary; Special Thanks; References; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions
Chapter 7. Seizure of Digital InformationIntroduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Conducting Cyber Investigations; Introduction; Demystifying Computer/Cyber Crime; Understanding IP Addresses; The Explosion of Networking; The Explosion of Wireless Networks; Interpersonal Communication
SummarySolutions Fast Track; Frequently Asked Questions; Chapter 9. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Cyber Crime Prevention; Introduction; Ways to Prevent Cyber Crime Targeted at You; Ways to Prevent Cyber Crime Targeted at the Family; Ways to Prevent Cyber Crime Targeted at Personal Property; Ways to Prevent Cyber Crime Targeted at a Business; Ways to Prevent Cyber Crime Targeted at an Organization
Ways to Prevent Cyber Crime Targeted at a Government Agency
Record Nr. UNINA-9910784622103321
Reyes Anthony  
Rockland, MA, : Syngress Publishing, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui