Computer forensics : cybercriminals, laws, and evidence / Marie-Helen Maras.
Publisher: Burlington, MA : Jones & Bartlett Learning, 2015Edition: 2nd editionDescription: xv, 408 pages : illustrations, forms ; 23 cmISBN:- 9781449692223 (pbk.)
- 1449692222 (pbk.)
- 363.259680973 23 MAR
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Closed Access | Engineering Library | 363.259680973 MAR (Browse shelf(Opens below)) | 1 | Available | BUML24010292 |
Contents
Chapter 1 Entering the world of Cybercrime
Cybercrime: Defined
Cybercrime versus tradition crime
Cybercrime Categories
Combating Cybercrime
Chapter summary
Chapter 2 An introduction to Computer forensic investigations and electronic evidence
Computer forensics: What is it?
Computer forensics investigation: The basics
Computer forensics investigations : A four-step process
Electronic evidence: What is it?
Types of evidences
etc
Chapter 3 Laws regulating access to electronic evidence
Telecommunications and Electronic Communication data
The statutory background of privacy protection and government access to data
Chapter summary
Chapter 4 Search and seizures of Computer and electronic evidence
What is privacy and Why is it important?
Constitutions sources of privacy protection
Search warrants
Chapter Summary
Chapter 5 Cyber-crime laws: Which statute for which Crime
Computer threats and intrusions
Financials crimes and frauds
Intellectual property theft and economic Espionage
Personal crime
Chapter summary
Chapter 6 Understanding the computer-networking Environment: Beware of the scam artists, Bullies and Lurking Predator
The art of deceiving; Social Engineering
Scams and Scam Artists
Identity theft
Cyberbullying
Child exploitation online
etc.
Chapter 7 Cyberterrorism: What it is, What it isn't, Why it matters, and what to do about it?
Defining Cyber terrorism
Criminalizing Cyberterrorism
Combating Cyberterrorism
Key terms
Chapter 8 Where is the electronic evidence, and which tools can we use to find it
The location of electronic evidence
Tools used to search and collect electronic evidence
Chapter summary
Chapter 9 Crime and incidence scene: What should an Investigator do?
Conducting an investigation
Special considerations for Cybercrime investigation
Identifying evidence
Analyzing evidence
etc
Chapter 10 corporate Crimes and policy Violations involving computers: How to conduct a corporate investigation
Corporate investigations
corporate Crime activities and policy violations
Preparing for the corporate investigation
Conducting for the corporate investigation
etc
Chapter 11 Email Forensics
The importance of Email corporate investigation
Email: The basics
How to conduct an Email corporate investigation
Problems encountered by computer forensic corporate investigation
Chapter summary
Chapter 12 Network Forensics : An introduction
Stand-Alone versus Network devices
Computer Network
Network Components
Where can Network - related evidence be found
etc
Chapter 13 Mobile Device in Computer forensics Investigations
Roles of Mobile devices
Mobile phone and PDAs versus other electronic devices
Which tools can be used to retrieve evidence
Mobile device investigations
Chapter summary
etc
Chapter 14 The Pretrial and courtroom experiences of a computer forensics investigation
Pretrial procedures
Testimony and rules of evidence
The role of Computer forensics Investigator in Pretrial proceedings and court
Chapter Summary
Includes bibliographical references and index p. 397-408
There are no comments on this title.