Catalogue

Record Details

Catalogue Search


Back To Results
Showing Item 2 of 390
Preferred library: Fernie Heritage Library?

Cybercrime investigations : the comprehensive resource for everyone  Cover Image Book Book

Cybercrime investigations : the comprehensive resource for everyone

Bandler, John (author.). Merzon, Antonia, (author.).

Summary: "Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include : Understanding cybercrime, computers, forensics, and cybersecurity, law for the cybercrime investigator, including cybercrime offenses ; cyber evidence-gathering ; criminal, private and regulatory law, and nation-state implications ; cybercrime investigation from three key perspectives : law enforcement, private sector, and regulatory ; financial investigation ; identification (attribution) of cyber-conduct ; apprehension ; litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts ; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout"--

Record details

  • ISBN: 9780367196233
  • ISBN: 0367196239
  • Physical Description: print
    xix, 335 pages : illustrations (black and white) ; 27 cm
  • Edition: First edition.
  • Publisher: Boca Raton, FL : CRC Press, 2020.

Content descriptions

Bibliography, etc. Note: Includes bibliographical references and index.
Formatted Contents Note: PART I: Understanding Cybercrime, Computers, and Cybersecurity -- Chapter 1. Introduction: The Need for Good Cybercrime Investigators -- 1.1 Why This Book -- 1.2 Who Investigates Cybercrime? -- 1.3 How This Book Is Organized -- 1.4 Keeping It Fun: Anecdotes, Cases, Diagrams, and Cartoons -- 1.5 Onward and Upward -- Chapter 2. What Is Cybercrime and Why Is It Committed? -- 2.1 Introduction 2.2 What Makes a "Cyber" Activity a Crime? A Quick Introduction to Cybercrime Offenses -- 2.2.1 Computer and Network Intrusions -- 2.2.2 Data Breaches, Theft of Data, and Data Trafficking -- 2.2.3 Transmission and Use of Malware -- 2.2.4 Tampering with or Damaging a Network or System -- 2.2.5 Identity Theft and Impersonation -- 2.2.6 Theft of Funds and Fraud Schemes -- 2.2.7 Blackmail and Extortion -- 2.2.8 Money Laundering -- 2.2.9 Harassment, Threats, Stalking, and Revenge Porn -- 2.2.10 Possessing, Selling, or Sharing Child Pornography -- 2.2.11 Trafficking of Physical Contraband 2.2.12 Gambling -- 2.3 Cybercrime vs. Traditional Street Crime: The Differences -- 2.3.1 Technology, Internet and Networks -- 2.3.2 Distance: The National and International Nexus -- 2.3.3 Investigation Rate and Solve Rate -- 2.3.4 Connection to a Broad Criminal Ecosystem -- 2.4 Motives and Actors -- 2.4.1 Profit and Greed -- 2.4.2 Personal Attack -- 2.4.3 Thrill and Bragging Rights -- 2.4.4 Activism -- 2.4.5 Corporate Espionage -- 2.4.6 Nation-State Objectives -- 2.4.7 Terrorism -- 2.5 The Cybercrime-For-Profit Economy -- 2.5.1 The Connection between Identity Theft and Cybercrime 2.5.2 The Cybercrime Economy Earns Money and Requires Payments -- 2.6 Digital Evidence: The Backbone of Any Cyber Investigation (and Traditional Investigations, Too) -- 2.7 Conclusion -- Chapter 3. Introduction to Computers, Networks, and Forensics -- 3.1 Introduction -- 3.2 How Computers Work -- 3.3 Basic Hardware PARTs of Computers -- 3.3.1 Case -- 3.3.2 Power Source -- 3.3.3 Processors (CPUs) -- 3.3.4 Memory (Volatile Storage -- RAM) -- 3.3.5 Persistent Storage (HDD/SSD) -- 3.3.6 Communicating with the User: Interfaces for Input and Output -- 3.3.7 Communicating with Other Computers (NIC) 3.3.8 Physical Ports -- 3.3.9 Putting the PARTs Together -- 3.3.10 External Storage, Servers and More -- 3.4 Basic Computer Software Categories -- 3.4.1 BIOS/UEFI -- 3.4.2 Operating Systems -- 3.4.3 Applications -- 3.5 Basic Networking and Internet Usage -- 3.5.1 Networking Hardware -- 3.5.1.1 NIC and MAC Addresses -- 3.5.1.2 Cables, Wireless, and Network Switches -- 3.5.1.3 Modem -- 3.5.1.4 Router -- 3.5.2 Networking Communication and Internet Protocol (IP) Addresses -- 3.5.3 TCP versus UDP -- 3.5.4 Domain Name System (DNS) -- 3.5.5 Website Hosting -- 3.6 Proxies, VPNs, and Tor -- 3.7 Encryption
Subject: Computer crimes -- Investigation

Available copies

  • 1 of 1 copy available at Sitka.

Holds

  • 0 current holds with 0 total copies.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Holdable? Status Due Date
The Pas Campus Library HV 8079 .C65 B36 2020 (Text) 58500000791699 Stacks Volume hold Available -

Back To Results
Showing Item 2 of 390
Preferred library: Fernie Heritage Library?

Additional Resources