High-Technology Crime Investigator's Handbook: Establishing and Managing a High-Technology Crime Prevention Program

Author:   Gerald L. Kovacich, CFE, CPP, CISSP (Security consultant, lecturer, and author, Oak Harbor, WA, USA) ,  Gerald L. Kovacich, CFE, CPP, CISSP (Security consultant, lecturer, and author, Oak Harbor, WA, USA) ,  Gerald L. Kovacich, CFE, CPP, CISSP (Security consultant, lecturer, and author, Oak Harbor, WA, USA) ,  Gerald L. Kovacich, CFE, CPP, CISSP (Security consultant, lecturer, and author, Oak Harbor, WA, USA)
Publisher:   Elsevier Science & Technology
Edition:   2nd Revised edition
ISBN:  

9780750679299


Pages:   470
Publication Date:   25 August 2006
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $72.95 Quantity:  
Add to Cart

Share |

High-Technology Crime Investigator's Handbook: Establishing and Managing a High-Technology Crime Prevention Program


Add your own review!

Overview

Full Product Details

Author:   Gerald L. Kovacich, CFE, CPP, CISSP (Security consultant, lecturer, and author, Oak Harbor, WA, USA) ,  Gerald L. Kovacich, CFE, CPP, CISSP (Security consultant, lecturer, and author, Oak Harbor, WA, USA) ,  Gerald L. Kovacich, CFE, CPP, CISSP (Security consultant, lecturer, and author, Oak Harbor, WA, USA) ,  Gerald L. Kovacich, CFE, CPP, CISSP (Security consultant, lecturer, and author, Oak Harbor, WA, USA)
Publisher:   Elsevier Science & Technology
Imprint:   Butterworth-Heinemann Ltd
Edition:   2nd Revised edition
Dimensions:   Width: 15.20cm , Height: 2.50cm , Length: 22.90cm
Weight:   0.660kg
ISBN:  

9780750679299


ISBN 10:   0750679298
Pages:   470
Publication Date:   25 August 2006
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

SECTION I - Introduction to the High Technology Crimes Environment 1. What Investigators Should Know About the High Technology Supported Global Threats 2. The High Technology Crimes' Miscreants, Profiles, Motives and Philosophies. 3. The Basic Techniques Used by High Technology Crimes' Miscreants 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes' Miscreants SECTION II - High-Technology Incidents and Crime Investigations 5. Investigating High Technology Crimes 6. Responding to High-Technology Incidents and Crimes 7. The Collection of Evidence 8. Interviews and Interrogations 9. An Introduction to Computer Forensics 10. Establishing and Managing a Computer Forensics Laboratory 11. High Technology Crimes: Case Summaries SECTION III - Overview of the High Technology Crimes Investigations Profession and Unit 12. The Global Enterprise Corporation (GEC) Model 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans 15. High Technology Anti-Crimes Investigations Program and Organization 16. High Technology Crimes Investigations Functions 17. Sources, Networking and Liaison 18. High Technology Crime Investigations Unit Metrics Management System 19. Outsourcing High-Technology Investigations - Pros and Cons SECTION IV - High Technology Crime Investigation Challenges of the 21st Century 20. The Future of High Technology and Its Impact on Working in a Global Information Environment 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems 22. Terrorism - Crime or War? Its Impact on the High Technology Incidents and Crimes' Investigations 23. The Future of the High Technology Crimes Investigator Profession 24. Developing a Career as a High Technology Crimes Investigator 25. Marketing Yourself as a Successful High Technology Crimes Investigator 26. Becoming a High Technology Consultant 27. Conclusions and Final Thoughts

Reviews

[The High-Technology-Crime Investigator's Handbook, Second Edition] not only provides a basic introduction into the world of high-tech crime but, more importantly for the readers, it is the only book I have found whose primary purpose is not about investigating high-tech crimes, but how to establish and manage a high-tech crimes investigative unit. - Howard A. Schmidt, President & CEO, R & H Security Consulting LLC, Former White House Cyber Security Advisor


The High-Technology-Crime Investigator's Handbook, Second Edition not only provides a basic introduction into the world of high-tech crime but, more importantly for the readers, it is the only book I have found whose primary purpose is not about investigating high-tech crimes, but how to establish and manage a high-tech crimes investigative unit. --Howard A. Schmidt, President & CEO, R & H Security Consulting LLC, Former White House Cyber Security Advisor


Author Information

Dr. Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security experience in both government as a special agent and as a manager in international corporations. Dr. Kovacich currently resides on an island in Washington state where he continues to write, lecture and conduct research relative to information systems security, information warfare defensive and offensive operations, high-technology crime and techno-terrorism. Andy Jones is an experienced Military Intelligence Analyst and Information Technology Security specialist. He has had considerable experience in the analysis of Intelligence material in Strategic, Tactical and Counter-Insurgency operations and a wide range of Information systems management experience. In addition, he has considerable experience in the security of Information Technology systems, having been responsible for the implementation of Information Technology security within all areas of the British Army and in some joint service organizations. He has directed both Intelligence and Security operations and briefed the results at the highest level. He was awarded the MBE for his work during his service in Northern Ireland and has gained an Open University Bachelor of Science degree in mathematics and technology and a Masters degree in Information Security and Computer Crime from the University of Glamorgan. After completing 25 years service with the British Army's Intelligence Corps, he moved into the area of defense research and was employed as the manager of a group of 80 research scientists and as a researcher and analyst in the area of Information Security. He has also had experience as a project manager within defense research for the security aspects of a number of large projects and has gained considerable expertise on the criminal and terrorist aspects of Information Security. He has undertaken a range of research into a number of aspects of Information warfare and the threats to information systems. 1n 2002 he co-authored a book on information warfare and is currently researching to write a book on the risks to information systems. In addition to his main work as a senior lecturer on Information Security and Computer Crime at the University of Glamorgan, he is currently also an associate lecturer for the Open University on Internet communications. His primary area of research for the last two years has been into methods for the measurement of t

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List