Cybercrime investigations : the comprehensive resource for everyone
Record details
- ISBN: 9780367196233
- ISBN: 0367196239
-
Physical Description:
print
xix, 335 pages : illustrations (black and white) ; 27 cm - Edition: First edition.
- Publisher: Boca Raton, FL : CRC Press, 2020.
- Copyright: ©2020
Content descriptions
Bibliography, etc. Note: | Includes bibliographical references and index. |
Formatted Contents Note: | PART I: Understanding Cybercrime, Computers, and Cybersecurity -- Chapter 1. Introduction: The Need for Good Cybercrime Investigators -- 1.1 Why This Book -- 1.2 Who Investigates Cybercrime? -- 1.3 How This Book Is Organized -- 1.4 Keeping It Fun: Anecdotes, Cases, Diagrams, and Cartoons -- 1.5 Onward and Upward -- Chapter 2. What Is Cybercrime and Why Is It Committed? -- 2.1 Introduction 2.2 What Makes a "Cyber" Activity a Crime? A Quick Introduction to Cybercrime Offenses -- 2.2.1 Computer and Network Intrusions -- 2.2.2 Data Breaches, Theft of Data, and Data Trafficking -- 2.2.3 Transmission and Use of Malware -- 2.2.4 Tampering with or Damaging a Network or System -- 2.2.5 Identity Theft and Impersonation -- 2.2.6 Theft of Funds and Fraud Schemes -- 2.2.7 Blackmail and Extortion -- 2.2.8 Money Laundering -- 2.2.9 Harassment, Threats, Stalking, and Revenge Porn -- 2.2.10 Possessing, Selling, or Sharing Child Pornography -- 2.2.11 Trafficking of Physical Contraband 2.2.12 Gambling -- 2.3 Cybercrime vs. Traditional Street Crime: The Differences -- 2.3.1 Technology, Internet and Networks -- 2.3.2 Distance: The National and International Nexus -- 2.3.3 Investigation Rate and Solve Rate -- 2.3.4 Connection to a Broad Criminal Ecosystem -- 2.4 Motives and Actors -- 2.4.1 Profit and Greed -- 2.4.2 Personal Attack -- 2.4.3 Thrill and Bragging Rights -- 2.4.4 Activism -- 2.4.5 Corporate Espionage -- 2.4.6 Nation-State Objectives -- 2.4.7 Terrorism -- 2.5 The Cybercrime-For-Profit Economy -- 2.5.1 The Connection between Identity Theft and Cybercrime 2.5.2 The Cybercrime Economy Earns Money and Requires Payments -- 2.6 Digital Evidence: The Backbone of Any Cyber Investigation (and Traditional Investigations, Too) -- 2.7 Conclusion -- Chapter 3. Introduction to Computers, Networks, and Forensics -- 3.1 Introduction -- 3.2 How Computers Work -- 3.3 Basic Hardware PARTs of Computers -- 3.3.1 Case -- 3.3.2 Power Source -- 3.3.3 Processors (CPUs) -- 3.3.4 Memory (Volatile Storage -- RAM) -- 3.3.5 Persistent Storage (HDD/SSD) -- 3.3.6 Communicating with the User: Interfaces for Input and Output -- 3.3.7 Communicating with Other Computers (NIC) 3.3.8 Physical Ports -- 3.3.9 Putting the PARTs Together -- 3.3.10 External Storage, Servers and More -- 3.4 Basic Computer Software Categories -- 3.4.1 BIOS/UEFI -- 3.4.2 Operating Systems -- 3.4.3 Applications -- 3.5 Basic Networking and Internet Usage -- 3.5.1 Networking Hardware -- 3.5.1.1 NIC and MAC Addresses -- 3.5.1.2 Cables, Wireless, and Network Switches -- 3.5.1.3 Modem -- 3.5.1.4 Router -- 3.5.2 Networking Communication and Internet Protocol (IP) Addresses -- 3.5.3 TCP versus UDP -- 3.5.4 Domain Name System (DNS) -- 3.5.5 Website Hosting -- 3.6 Proxies, VPNs, and Tor -- 3.7 Encryption |
Search for related items by subject
Subject: | Computer crimes -- Investigation |
Available copies
- 1 of 1 copy available at Sitka.
Holds
- 0 current holds with 0 total copies.
Show Only Available Copies
Location | Call Number / Copy Notes | Barcode | Shelving Location | Holdable? | Status | Due Date |
---|---|---|---|---|---|---|
The Pas Campus Library | HV 8079 .C65 B36 2020 (Text) | 58500000791699 | Stacks | Volume hold | Available | - |