Amazon cover image
Image from Amazon.com

Computer forensics : cybercriminals, laws, and evidence / Marie-Helen Maras.

By: Publisher: Burlington, MA : Jones & Bartlett Learning, 2015Edition: 2nd editionDescription: xv, 408 pages : illustrations, forms ; 23 cmISBN:
  • 9781449692223 (pbk.)
  • 1449692222 (pbk.)
Subject(s): DDC classification:
  • 363.259680973 23 MAR
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Closed Access Book Closed Access Engineering Library 363.259680973 MAR (Browse shelf(Opens below)) 1 Available BUML24010292

Contents

Chapter 1 Entering the world of Cybercrime
Cybercrime: Defined
Cybercrime versus tradition crime
Cybercrime Categories
Combating Cybercrime
Chapter summary

Chapter 2 An introduction to Computer forensic investigations and electronic evidence
Computer forensics: What is it?
Computer forensics investigation: The basics
Computer forensics investigations : A four-step process
Electronic evidence: What is it?
Types of evidences
etc

Chapter 3 Laws regulating access to electronic evidence
Telecommunications and Electronic Communication data
The statutory background of privacy protection and government access to data
Chapter summary

Chapter 4 Search and seizures of Computer and electronic evidence
What is privacy and Why is it important?
Constitutions sources of privacy protection
Search warrants
Chapter Summary

Chapter 5 Cyber-crime laws: Which statute for which Crime
Computer threats and intrusions
Financials crimes and frauds
Intellectual property theft and economic Espionage
Personal crime
Chapter summary

Chapter 6 Understanding the computer-networking Environment: Beware of the scam artists, Bullies and Lurking Predator
The art of deceiving; Social Engineering
Scams and Scam Artists
Identity theft
Cyberbullying
Child exploitation online
etc.

Chapter 7 Cyberterrorism: What it is, What it isn't, Why it matters, and what to do about it?
Defining Cyber terrorism
Criminalizing Cyberterrorism
Combating Cyberterrorism
Key terms

Chapter 8 Where is the electronic evidence, and which tools can we use to find it
The location of electronic evidence
Tools used to search and collect electronic evidence
Chapter summary

Chapter 9 Crime and incidence scene: What should an Investigator do?
Conducting an investigation
Special considerations for Cybercrime investigation
Identifying evidence
Analyzing evidence
etc

Chapter 10 corporate Crimes and policy Violations involving computers: How to conduct a corporate investigation
Corporate investigations
corporate Crime activities and policy violations
Preparing for the corporate investigation
Conducting for the corporate investigation
etc

Chapter 11 Email Forensics
The importance of Email corporate investigation
Email: The basics
How to conduct an Email corporate investigation
Problems encountered by computer forensic corporate investigation
Chapter summary

Chapter 12 Network Forensics : An introduction
Stand-Alone versus Network devices
Computer Network
Network Components
Where can Network - related evidence be found
etc

Chapter 13 Mobile Device in Computer forensics Investigations
Roles of Mobile devices
Mobile phone and PDAs versus other electronic devices
Which tools can be used to retrieve evidence
Mobile device investigations
Chapter summary
etc

Chapter 14 The Pretrial and courtroom experiences of a computer forensics investigation
Pretrial procedures
Testimony and rules of evidence
The role of Computer forensics Investigator in Pretrial proceedings and court
Chapter Summary











































































Includes bibliographical references and index p. 397-408

There are no comments on this title.

to post a comment.