My Library

     
Limit search to available items
Reviews & More
Book, etc.
Author Maras, Marie-Helen, 1979-

Title Computer forensics : cybercriminals, laws, and evidence / by Marie-Helen Maras

Publ Info Sudbury, Mass. : Jones & Bartlett Learning, 2012
LOCATION CALL # STATUS NOTE
 CCE Main Collection  KF8947.5 .M37 2012    AVAILABLE
 CCRI-Lincoln  KF8947.5 .M37 2012    AVAILABLE
 J&W-N.Miami  KF8947.5 .M37 2012    AVAILABLE
 RWU Main Library  KF8947.5 .M37 2012    AVAILABLE
Descript xiv, 368 pages ; 23 cm
text rdacontent
unmediated rdamedia
volume rdacarrier
Note Includes bibliographical references and index
Contents Preface -- Acknowledgments -- Chapter 1: Entering The World Of Cybercrime -- Cybercrime: defined -- Cybercrime versus traditional crime -- Cybercrime categories -- Combating cybercrime -- Chapter summary -- Key terms -- Practical exercise -- Critical thinking question -- Review questions -- Footnotes -- Chapter 2: Introduction To Computer Forensics Investigations And Electronic Evidence -- Computer Forensics: what is it? -- Computer forensics investigations: the basics -- Computer forensics investigations: a four-step process -- Electronic evidence: what is it? -- Types of evidence -- Authentication of evidence -- Standards of evidence -- Chapter summary -- Key terms -- Practical exercise -- Review questions -- Footnotes -- Chapter 3: Laws Regulating Access To Electronic Evidence -- Telecommunications and electronic communications data -- Statutory background of privacy protection and government access to data -- Chapter summary -- Key terms -- Practical exercise -- Critical thinking questions -- Review questions -- Footnotes -- Chapter 4: Searches And Seizures Of Computers And Electronic Evidence -- What is privacy and why is it important? -- Constitutional source of privacy protection: the Fourth Amendment -- Searches warrants -- Searching the computer for evidence -- Chapter summary -- Key terms -- Critical thinking questions -- Review questions -- Footnotes -- Chapter 5: Cybercrime Laws: Which Statute For Which Crime? -- Computer threats and intrusions -- Financial crimes and fraud -- Intellectual property theft and economic espionage -- Personal crimes -- Chapter summary -- Key terms -- Critical thinking questions -- Review questions -- Footnotes -- Chapter 6: Understanding The Computer-Networking Environment: Beware Of The Scam Artists, Bullies, And Lurking Predators! -- Scams and scam artists -- Identity theft -- Cyberbullying -- Child exploitation online -- Chapter summary -- Key terms -- Practical exercise -- Review questions -- Footnotes -- Chapter 7: Where Is The Electronic Evidence And Which Tools Can We Use To Find It? -- Location of electronic evidence -- Tools used to search and collect electronic evidence -- Chapter summary -- Key terms -- Practical exercises -- Critical thinking question -- Review questions -- Footnotes -- Chapter 8: Crime And Incident Scene: What Should An Investigator Do? -- Conducting and investigation -- Special considerations for cybercrime investigations -- Identifying evidence -- Analysis of evidence -- How to handle evidence in an investigation -- Hypothetical criminal investigation -- Extracting electronic evidence -- Chapter summary -- Key terms -- Critical thinking questions -- Review questions -- Footnotes -- Chapter 9: Corporate Crimes And Policy Violations Involving Computers: How To Conduct A Corporate Investigation -- Corporate investigations -- Corporate criminal activities and policy violations -- Preparing for the investigation -- Conducting the investigation -- Chapter summary -- Key terms -- Review questions -- Footnotes -- Chapter 10: E-mail Forensics -- Importance of e-mail investigations -- E-mail: the basics -- How to conduct an E-mail investigation -- Problems encountered by computer forensics investigators -- Chapter summary -- Key terms -- Practical thinking question -- Review questions -- Footnotes -- Chapter 11: Network Forensics: An Introduction -- Stand-alone versus networked devices -- Computer networks -- Network components -- Where can network-related evidence be found? -- Network forensics analysis tools -- Special issues when conducting investigations in a networked environment -- Preliminary analysis -- Documentation and collection -- Analysis and preservation -- Chapter summary -- Key terms -- Review questions -- Footnotes -- Chapter 12: Mobile Phones And PDAs In Computer Forensics Investigations -- Role of mobile phones and PDAs -- Mobile phones and PDAs versus other electronic devices -- Which tools can be used to retrieve evidence? -- Mobile phone and PDA investigations -- Chapter summary -- Key terms -- Practical exercise -- Critical thinking questions -- Review questions -- Footnotes -- Chapter 13: Pretrial And Courtroom Experiences Of A Computer Forensics Investigator -- Pretrial procedures -- Testimony and rules of evidence -- Role of the computer forensics investigator in pretrial proceedings and court -- Chapter summary -- Key terms -- Critical thinking questions -- Footnotes -- Glossary -- Index
LC subject Electronic evidence -- United States
Computer crimes -- Investigation -- United States
ISBN 9781449600723
1449600727