E-Book - Scene of the Cybercrime: Computer Forensics Handbook 08-18-2011, 06:13 PM
#1
E-Book - Scene of the Cybercrime: Computer Forensics Handbook
Info:
Scene of the Cybercrime: Computer Forensics Handbook
Publisher: Syngress | ISBN: 1931836655 | edition 2002 | PDF | 754 pages | 5,8 mb
This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must not be contaminated. It provides law enforcement officers with an understanding of the technical aspects of cybercrime and of how technology can be used to help solve crimes that have been committed.
Table Of Contents:
Chapter 1 Facing the Cybercrime Problem Head On
Chapter 2 Reviewing the History of Cybercrime
Thats just the first 2 of 11 chapters, so you will get a lot of info from this![Biggrin Biggrin](https://sinister.ly/images/smilies/set/biggrin.png)
Download: http://uppit.com/xk451p2b2zx3/Scene_of_t...ndbook.pdf
Info:
Scene of the Cybercrime: Computer Forensics Handbook
Publisher: Syngress | ISBN: 1931836655 | edition 2002 | PDF | 754 pages | 5,8 mb
This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must not be contaminated. It provides law enforcement officers with an understanding of the technical aspects of cybercrime and of how technology can be used to help solve crimes that have been committed.
Table Of Contents:
Chapter 1 Facing the Cybercrime Problem Head On
- Introduction
- Quantifying the Crisis
- Defining Cybercrime
- Moving from the General to the Specific
- Understanding the Importance of Jurisdictional Issues
- Differentiating Crimes That Use the Net from Crimes That
- Depend on the Net
- Collecting Statistical Data on Cybercrime
- Understanding the Crime Reporting System
- Categorizing Crimes for the National Reporting System
- Toward a Working Definition of Cybercrime
- U.S. Federal and State Statutes
- International Law:The United Nations Definition of
- Cybercrime
- Categorizing Cybercrime
- Developing Categories of Cybercrimes
- Violent or Potentially Violent Cybercrime Categories
- Nonviolent Cybercrime Categories
- Prioritizing Cybercrime Enforcement
- Fighting Cybercrime
- Determining Who Will Fight Cybercrime
- Educating Cybercrime Fighters
- Educating Legislators and Criminal Justice Professionals
- Educating Information Technology Professionals
- Educating and Engaging the Community
- Getting Creative in the Fight Against Cybercrime
- Using Peer Pressure to Fight Cybercrime
- Using Technology to Fight Cybercrime
- Finding New Ways to Protect Against Cybercrime
- Summary
- Frequently Asked Questions
- Resources
Chapter 2 Reviewing the History of Cybercrime
- Introduction
- Exploring Criminality in the Days of Standalone Computers
- Sharing More Than Time
- The Evolution of a Word
- Understanding Early Phreakers, Hackers, and Crackers
- Hacking Ma Bell’s Phone Network
- Phamous Phreakers
- Phreaking on the Other Side of the Atlantic
- A Box for Every Color Scheme
- From Phreaker to Hacker
- Living on the LAN: Early Computer Network Hackers
- How BBSs Fostered Criminal Behavior
- How Online Services Made Cybercrime Easy
- Introducing the ARPANet:: the Wild West of Networking
- Sputnik Inspires ARPA
- ARPA Turns Its Talents to Computer Technology
- Network Applications Come into Their Own
- The Internetwork Continues to Expand
- The ARPANet of the 1980s
- The Internet of the 1990s
- The Worm Turnsâ€â€Âand Security Becomes a Concern
- Watching Crime Rise with the Commercialization of the Internet 61
- Bringing the Cybercrime Story Up to Date
- Understanding How New Technologies Create New Vulnerabilities
- Why Cybercriminals Love Broadband
- Why Cybercriminals Love Wireless
- Why Cybercriminals Love Mobile Computing
- Why Cybercriminals Love Sophisticated Web and
- E-Mail Technologies
- Contents
- Why Cybercriminals Love E-Commerce and
- Online Banking
- Why Cybercriminals Love Instant Messaging
- Why Cybercriminals Love New Operating Systems and Applications
- Why Cybercriminals Love Standardization
- Planning for the Future: How to Thwart Tomorrow’s
- Cybercriminal
- Summary
- Frequently Asked Questions
- Resources
Thats just the first 2 of 11 chapters, so you will get a lot of info from this
![Biggrin Biggrin](https://sinister.ly/images/smilies/set/biggrin.png)
Download: http://uppit.com/xk451p2b2zx3/Scene_of_t...ndbook.pdf