|
|
libcats.org
Digital Evidence and Computer CrimeEoghan Casey BS MADigital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about: * Components of computer networks * Use of computer networks in an investigation * Abuse of computer networks * Privacy and security issues on computer networks * The law as it applies to computer networks * Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence * Offers readers information about relevant legal issues * Features coverage of the abuse of computer networks and privacy and security issues on computer networks * Free unlimited access to author's Web site which includes numerous and frequently updated case examples
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Genki 1: An Integrated Course in Elementary Japanese 1Автор: Eri Banno, Автор: Yutaka Ohno, Автор: Yoko Sakane, Автор: Chikako Shinagawa, Автор:
Размер книги: 172.22 Mb
Только что пользователи скачали эти книги:
МироновАвтор: Федорович Лосев ЕвгенийКатегория: Историческая проза, Биографии и Мемуары
Размер книги: 2.20 Mb
From Molecules to Networks: An Introduction to Cellular and Molecular NeuroscienceАвтор: John H. Byrne, Автор: James L. RobertsКатегория: Medicine, Neuroscience
Размер книги: 40.24 Mb
Крестьянский вопрос в России в XVII и первой половине XIX векаАвтор: В. И. СемевскийКатегория: ИСТОРИЯ
Размер книги: 115.60 Mb
Silviculture in the TropicsАвтор: Sven Günter, Автор: Michael Weber, Автор: Bernd Stimm, Автор: Reinhard Mosandl
Размер книги: 5.28 Mb
Radio Frequency Integrated Circuit DesignАвтор: John M. W. Rogers, Автор: Calvin Plett
Размер книги: 8.26 Mb
Percy's Chocolate Crunch and Other Thomas the Tank Engine StoriesАвтор: House Random, Автор: Mitton David, Автор: Palone TerryКатегория: fiction
Размер книги: 10.38 Mb
What You Leave BehindАвтор: Carey Diane, Автор: Behr Ira S, Автор: Beimler HansКатегория: fiction
Размер книги: 217 Kb
|
|
|