This thoroughly updated edition of Computer Crime, Investigation, And The Law provides a comprehensive overview of computer forensics, computer laws, and computer-related trials-written to be accessible to the layman as well as the professional. This revised edition includes new and expanded coverage of current computer laws and hacking techniques, as well as updates to sections covering evidence collection, litigation, and more. Unlike other books in this field, it covers a combination of both technical and legal aspects. It also includes numerous real-world case studies and coverage of expert witnesses. Keep up with this burgeoning high-tech/legal field with Computer Crime, Investigation, And The Law, Second Edition.
Les mer
Provides a comprehensive overview of computer forensics, computer laws, and computer-related trials - written to be accessible to the layman as well as the professional. This revised edition includes coverage of various computer laws and hacking techniques, as well as updates to sections covering evidence collection, litigation, and more.
Les mer
Section I: COMPUTER CRIME. 1. Introduction to computer crime. 2. A history of computer crime in America. 3. United States Computer laws Part I. 4. United States Computer laws Part II. 5. Techniques and resources of computer crime. 6. Organized computer crime and terrorism. Section II: COMPUTER FORENSICS. 7. Introduction to computer forensics. 8. Collecting evidence from hardware. 9. Collecting evidence from the operating system. Chapter10. Collecting evidence from other sources. Section III: LITIGATION. 11. Experts and Expert Reports. 12. Depositions and Trials. 13. Civil matters relating to computer crime. Section IV: COMPUTER CRIME AND INDIVIDUALS. 14. Protecting Children on the Internet. 15. How to protect your identity on the Internet. 16. Harassment and Stalking via the computer. Section V Techniques. 17. Hacking Techniques. Appendices. Appendix A. Introduction to computer networks. Appendix B. Glossary.
Les mer

Produktdetaljer

ISBN
9781305507333
Publisert
2015-03-06
Utgave
2. utgave
Utgiver
Vendor
CENGAGE Learning Custom Publishing
Høyde
246 mm
Bredde
189 mm
Dybde
20 mm
Aldersnivå
05, U
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
650

Biographical note

Chuck Easttom has 15 years' experience in the IT industry and has been an expert witness on several computer-related cases. He is the author of ten computer-science books including two textbooks on computer security. He was also one of the subject matter experts who helped to create CompTIA's Security+ certification test. He has been a frequent guest speaker on computer security at various computer groups and campuses including Harvard and Columbia. He holds more than a dozen computer industry certifications. Jeff Taylor is a McKinney, Texas, police detective who began his law-enforcement career in 1982. He is currently assigned to the Criminal Investigations unit, where he specializes in white-collar crimes. In 2003, Detective Taylor became certified in computer-forensic evidence recovery. He uses various computer software systems, including EnCase, Helix, and I-Look. He has received training and certifications from the FBI, Cyber Evidence Inc., the National White Collar Crime Center, and the High Intensity Drug Trafficking Area (HIDTA) task force. Detective Taylor is on the instructor staff at the Collin County Law Enforcement Academy, where he teaches a course on electronic crime scene investigations.