Search Books
Enterprise Directory and Se… Handbook of Computer Crime …

Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet

Author Eoghan Casey BS MA
Publisher Academic Press
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
74.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $0.01
Share:
Book Details
ISBN / ASIN012162885X
ISBN-139780121628857
Sales Rank3,015,124
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.

Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked,
collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime.

This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.

The accompanying CD-ROM contains simulated cases that integrate many of the topics covered in the text, teaching individuals about:
* Includes CD-ROM multimedia appendix containing simulated cases
* Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence
* Offers readers information about relevant legal issues
* Features coverage of the abuse of computer networks and privacy and security issues on computer networks
Data Mining: Concepts, Models, Methods, and Algorithms
View
Macromedia Flash MX ActionScript Bible
View
Exam Ref 70-484 Essentials of Developing Windows Store…
View
The Photoshop Show Starring Russell Brown
View
Distributed .NET Programming in VB .NET
View
Fuzzy Logik: Theorie und Praxis 4. Dortmunder Fuzzy-Ta…
View
Crafting A Compiler
View
Refactoring: Ruby Edition: Ruby Edition (Addison-Wesle…
View