Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
![]() |
Afghanistan | Available | EBKAF00020498 | |||
![]() |
Algeria | Available | ||||
![]() |
Cyprus | Available | ||||
![]() |
Egypt | Available | ||||
![]() |
Libya | Available | ||||
![]() |
Morocco | Available | ||||
![]() |
Nepal | Available | EBKNP00020498 | |||
![]() |
Sudan
Access a wide range of magazines and books using Pressreader and Ebook central. |
Available | ||||
![]() |
Tunisia | Available |
Front Cover -- Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors -- Copyright Page -- Contents -- Chapter 1. The Problem at Hand -- Introduction -- The Gaps in Cyber Crime Law -- Unveiling the Myths Behind Cyber Crime -- Prioritizing Evidence -- Setting the Bar Too High -- Summary -- Works Referenced -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. "Computer Crime" Discussed -- Introduction -- Examining "Computer Crime" Definitions -- Dissecting "Computer Crime" -- Using Clear Language to Bridge the Gaps -- Summary -- Works Referenced -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Preparing for Prosecution and Testifying -- Introduction -- Common Misconceptions -- Chain of Custody -- Keys to Effective Testimony -- Differences between Civil and Criminal Cases -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Cyber Investigative Roles -- Introduction -- Understanding Your Role as a Cyber Crime Investigator -- The Role of Law Enforcement Officers -- The Role of the Prosecuting Attorney -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Works Referenced -- Chapter 5. Incident Response: Live Forensics and Investigations -- Introduction -- Postmortmem versus Live Forensics -- Today's Live Methods -- Case Study: Live versus Postmortem -- Computer Analysis for the Hacker Defender Program -- Network Analysis -- Summary -- Special Thanks -- References -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Legal Issues of Intercepting WiFi Transmissions -- Introduction -- WiFi Technology -- Understanding WiFi RF -- Scanning RF -- Eavesdropping on WiFi -- Fourth Amendment Expectation of Privacy in WLANs -- Summary -- Works Cited -- Solutions Fast Track -- Frequently Asked Questions.
Chapter 7. Seizure of Digital Information -- Introduction -- Defining Digital Evidence -- Digital Evidence Seizure Methodology -- Factors Limiting the Wholesale Seizure of Hardware -- Other Options for Seizing Digital Evidence -- Common Threads within Digital Evidence Seizure -- Determining the Most Appropriate Seizure Method -- Summary -- Works Cited -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Conducting Cyber Investigations -- Introduction -- Demystifying Computer/Cyber Crime -- Understanding IP Addresses -- The Explosion of Networking -- The Explosion of Wireless Networks -- Interpersonal Communication -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Digital Forensics and Analyzing Data -- Introduction -- The Evolution of Computer Forensics -- Phases of Digital Forensics -- Summary -- References -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Cyber Crime Prevention -- Introduction -- Ways to Prevent Cyber Crime Targeted at You -- Ways to Prevent Cyber Crime Targeted at the Family -- Ways to Prevent Cyber Crime Targeted at Personal Property -- Ways to Prevent Cyber Crime Targeted at a Business -- Ways to Prevent Cyber Crime Targeted at an Organization -- Ways to Prevent Cyber Crime Targeted at a Government Agency -- Summary -- Notes -- Solutions Fast Track -- Frequently Asked Questions -- Appendix A: Legal Principles for Information Security Evaluations -- Introduction -- Uncle Sam Wants You: How Your Company's Information Security Can Affect U.S. National Security (and Vice Versa) -- Legal Standards Relevant to Information Security -- Do It Right or Bet the Company:Tools to Mitigate Legal Liability -- What to Cover in Security Evaluation Contracts -- The First Thing We Do…? Why You Want Your Lawyers Involved from Start to Finish -- Solutions Fast Track.
Frequently Asked Questions -- References -- Appendix B: Investigating Insider Threat Using Enterprise Security Management. -- What Is ESM? -- What Is a Chinese Wall? -- Data Sources -- Bridging the Chinese Wall: Detection through Convergence -- Conclusion -- Index.
The Only Book on Cyber Crime for Incident Handlers, First Responders, Police Investigators and Prosecutors!.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.