Cyber crime investigations [[electronic resource] ] : bridging the gaps between security professionals, law enforcement, and prosecutors / / Anthony Reyes ... [et. al] |
Autore | Reyes Anthony |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2007 |
Descrizione fisica | 1 online resource (433 p.) |
Disciplina | 363.25/968 |
Soggetto topico | Computer crimes - Investigation |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-06022-4
9786611060220 0-08-055363-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors; Copyright Page; Contents; Chapter 1. The Problem at Hand; Introduction; The Gaps in Cyber Crime Law; Unveiling the Myths Behind Cyber Crime; Prioritizing Evidence; Setting the Bar Too High; Summary; Works Referenced; Solutions Fast Track; Frequently Asked Questions; Chapter 2. "Computer Crime" Discussed; Introduction; Examining "Computer Crime" Definitions; Dissecting "Computer Crime"; Using Clear Language to Bridge the Gaps; Summary; Works Referenced
Solutions Fast TrackFrequently Asked Questions; Chapter 3. Preparing for Prosecution and Testifying; Introduction; Common Misconceptions; Chain of Custody; Keys to Effective Testimony; Differences between Civil and Criminal Cases; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Cyber Investigative Roles; Introduction; Understanding Your Role as a Cyber Crime Investigator; The Role of Law Enforcement Officers; The Role of the Prosecuting Attorney; Summary; Solutions Fast Track; Frequently Asked Questions; Works Referenced Chapter 5. Incident Response: Live Forensics and InvestigationsIntroduction; Postmortmem versus Live Forensics; Today's Live Methods; Case Study: Live versus Postmortem; Computer Analysis for the Hacker Defender Program; Network Analysis; Summary; Special Thanks; References; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions Chapter 7. Seizure of Digital InformationIntroduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Conducting Cyber Investigations; Introduction; Demystifying Computer/Cyber Crime; Understanding IP Addresses; The Explosion of Networking; The Explosion of Wireless Networks; Interpersonal Communication SummarySolutions Fast Track; Frequently Asked Questions; Chapter 9. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Cyber Crime Prevention; Introduction; Ways to Prevent Cyber Crime Targeted at You; Ways to Prevent Cyber Crime Targeted at the Family; Ways to Prevent Cyber Crime Targeted at Personal Property; Ways to Prevent Cyber Crime Targeted at a Business; Ways to Prevent Cyber Crime Targeted at an Organization Ways to Prevent Cyber Crime Targeted at a Government Agency |
Record Nr. | UNINA-9910458824303321 |
Reyes Anthony
![]() |
||
Rockland, MA, : Syngress Publishing, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber crime investigations [[electronic resource] ] : bridging the gaps between security professionals, law enforcement, and prosecutors / / Anthony Reyes ... [et. al] |
Autore | Reyes Anthony |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2007 |
Descrizione fisica | 1 online resource (433 p.) |
Disciplina | 363.25/968 |
Soggetto topico | Computer crimes - Investigation |
ISBN |
1-281-06022-4
9786611060220 0-08-055363-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors; Copyright Page; Contents; Chapter 1. The Problem at Hand; Introduction; The Gaps in Cyber Crime Law; Unveiling the Myths Behind Cyber Crime; Prioritizing Evidence; Setting the Bar Too High; Summary; Works Referenced; Solutions Fast Track; Frequently Asked Questions; Chapter 2. "Computer Crime" Discussed; Introduction; Examining "Computer Crime" Definitions; Dissecting "Computer Crime"; Using Clear Language to Bridge the Gaps; Summary; Works Referenced
Solutions Fast TrackFrequently Asked Questions; Chapter 3. Preparing for Prosecution and Testifying; Introduction; Common Misconceptions; Chain of Custody; Keys to Effective Testimony; Differences between Civil and Criminal Cases; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Cyber Investigative Roles; Introduction; Understanding Your Role as a Cyber Crime Investigator; The Role of Law Enforcement Officers; The Role of the Prosecuting Attorney; Summary; Solutions Fast Track; Frequently Asked Questions; Works Referenced Chapter 5. Incident Response: Live Forensics and InvestigationsIntroduction; Postmortmem versus Live Forensics; Today's Live Methods; Case Study: Live versus Postmortem; Computer Analysis for the Hacker Defender Program; Network Analysis; Summary; Special Thanks; References; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions Chapter 7. Seizure of Digital InformationIntroduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Conducting Cyber Investigations; Introduction; Demystifying Computer/Cyber Crime; Understanding IP Addresses; The Explosion of Networking; The Explosion of Wireless Networks; Interpersonal Communication SummarySolutions Fast Track; Frequently Asked Questions; Chapter 9. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Cyber Crime Prevention; Introduction; Ways to Prevent Cyber Crime Targeted at You; Ways to Prevent Cyber Crime Targeted at the Family; Ways to Prevent Cyber Crime Targeted at Personal Property; Ways to Prevent Cyber Crime Targeted at a Business; Ways to Prevent Cyber Crime Targeted at an Organization Ways to Prevent Cyber Crime Targeted at a Government Agency |
Record Nr. | UNINA-9910784622103321 |
Reyes Anthony
![]() |
||
Rockland, MA, : Syngress Publishing, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|