|
![]() |
|||
|
||||
OverviewWritten by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, issues involving the authorities, and helpful case studies. Updated chapters incorporate new kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating systems, the impact of the Patriot Act, and new ways of analyzing computer media. Full Product DetailsAuthor: Peter Stephenson (Norwich University, Northfield, Vermont, USA) , Keith Gilbert (Enfield, New Hampshire, USA)Publisher: Taylor & Francis Inc Imprint: CRC Press Inc Edition: 2nd edition Dimensions: Width: 15.60cm , Height: 2.30cm , Length: 23.40cm Weight: 0.703kg ISBN: 9780849319730ISBN 10: 0849319730 Pages: 404 Publication Date: 19 April 2013 Audience: Professional and scholarly , Professional and scholarly , Professional & Vocational , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents"The Nature of Cybercrime. Cybercrime as We Enter the Twenty-First Century. The Potential Impacts of Cybercrime. Malware Attacks. Surgical Strikes and Shotgun Blasts. Investigating Cybercrime. A Framework for Conducting an Investigation of a Computer Security Incident. Look for the Hidden Flaw. Analyzing the Remnants of a Computer Security Incident. Launching the Investigation. Determining If a Crime Has Taken Place. Cover-Ups Are Common. Involving the Authorities. When an Investigation Cannot Continue. Preparing for Cybercrime. Building a Corporate Cyber ""SWAT Team"". Privacy and Computer Crime. Introduction to End-to-End Digital Investigation. Collecting and Analyzing Evidence of a Computer Crime. Using Evidence Effectively. Conducting Incident Postmortems. Appendix A. Appendix B. Appendix C. Index."ReviewsAuthor InformationPeter Stephenson, PhD, is a cyber criminologist, digital investigator, and digital forensic scientist at Norwich University (Vermont). He is a writer, researcher, and lecturer on information assurance, digital investigation, and forensics on large-scale computer networks. He has lectured extensively on digital investigation and security, and has written, edited, or contributed to 16 books and several hundred articles in major national and international trade, technical, and scientific publications. Dr. Stephenson is a Fellow of the Institute for Communications, Arbitration, and Forensics in the United Kingdom, an associate member of the American Academy of Forensic Sciences, a member of the Vidocq Society, and on the board of Vermont InfraGard. He holds the CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), and FICAF (Fellow of the Institute for Communications Arbitration and Forensics) designations, and his research is focused on cybercrime assessment and profiling compromised networks. Keith Gilbert is a senior information security specialist on the Verizon RISK Team. He obtained both his BS and MS in information assurance from Norwich University and is an experienced digital forensic analyst. Gilbert has worked in both the public and private sectors among organizations ranging from 50 to 200,000 employees. He holds the Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA) and GIAC Certified Incident Handler (GCIH) certifications and is an associate of the International Information Systems Security Certification Consortium ((ISC)2). Tab Content 6Author Website:Countries AvailableAll regions |