Cover image for Computer Crime, Investigation, and the Law.
Computer Crime, Investigation, and the Law.
Title:
Computer Crime, Investigation, and the Law.
Author:
Easttom, Chuck.
ISBN:
9781435456105
Personal Author:
Physical Description:
1 online resource (518 pages)
Contents:
Contents -- Introduction -- Part 1 Computer Crime -- Chapter 1 Introduction to Computer Crime -- Introduction -- Identity Theft -- Cyber Stalking/Harassment -- Unauthorized Access to Computer Systems or Data -- Fraud -- Non-Access Computer Crimes -- Cybercrime Meets the Real World -- Hate Groups, Gangs, and the Internet -- Conclusion -- Chapter 2 A History of Computer Crime in America -- Introduction -- The ''Prehistory'' of Computer Crime -- The Early Days -- The 1990s -- The 21[sup(st)] Century -- Modern Attacks -- Issues -- Conclusion -- Chapter 3 United States Computer Laws Part I -- Introduction -- The Ribicoff Bill -- The Computer Fraud and Abuse Act of 1986 -- The Electronic Communications Privacy Act of 1986 -- The Communications Decency Act of 1996 -- No Electronic Theft Act of 1997 -- Digital Millennium Copyright Act -- Children's Internet Protection Act -- CAN-SPAM Act of 2003 -- Identity Theft Enforcement and Restitution Act of 2008 -- Conclusion -- Chapter 4 United States Computer Laws Part II -- Introduction -- Cyber-Stalking Laws -- Identity-Theft Laws -- Child-Pornography Laws -- Hacking Laws -- State Spyware Laws -- Conclusion -- Chapter 5 Techniques and Resources for Computer Crime -- Introduction -- Identity-Theft Techniques -- Fraud Techniques -- Hacking Techniques -- Conclusion -- Chapter 6 Organized Crime and Cyber Terrorism -- Introduction -- Organized Crime on the Internet -- Cyber Terrorism -- Conclusion -- Part 2 Computer Forensics -- Chapter 7 Observing, Collecting, Documenting, and Storing Electronic Evidence -- Introduction -- Federal Guidelines -- Basic Forensics -- Securing the Scene -- Remove Individuals Involved -- Document Everything -- Conclusion -- Chapter 8 Collecting Evidence from Hardware -- Introduction -- Forensic Tools -- Computer Acquisitions -- Conclusions.

Chapter 9 Collecting Evidence from the Operating System -- Introduction -- Finding Evidence in Browsers, Chat Logs, and Other Applications -- Finding Evidence in System Logs -- Recovering Deleted Files -- Other Forensic Tools -- Important Locations to Check -- Operating-System Utilities -- Conclusion -- Chapter 10 Collecting Evidence from Other Sources -- Introduction -- Tracing IP Addresses -- Gathering E-mail Evidence -- Gathering Evidence from Routers -- Gathering Evidence from a Cell Phone -- Gathering Evidence from Firewalls -- Gathering Evidence from Intrusion-Detection Systems -- Conclusion -- Part 3 Litigation -- Chapter 11 Experts and Expert Reports -- Introduction -- Selecting an Expert -- Personality Issues in an Expert -- Hiring and Paying Experts -- Volunteer Experts -- Expert Reports -- Conclusion -- Chapter 12 Depositions and Trials -- Introduction -- Depositions -- Trials -- Case Studies -- Conclusion -- Chapter 13 Civil Matters Relating to Computer Crime -- Introduction -- Civil Law Related to Computer Crime -- What Court? -- The Process -- Real Cases -- Conclusion -- Part 4 Computer Crime and Individuals -- Chapter 14 Protecting Children on the Internet -- Introduction -- The Problem -- Solutions for Parents -- Solutions for Law Enforcement -- Conclusion -- Chapter 15 How to Protect Your Identity on the Internet -- Introduction -- What You Can Do -- Law Enforcement and Identity Theft -- Conclusion -- Chapter 16 Harassment and Stalking Via the Computer -- Introduction -- What Is Cyber Stalking and Harassment? -- Why Cyber Stalkers Do It -- Real-World Cases -- Protecting Yourself -- Guidelines for Law Enforcement -- Conclusion -- Part 5 Techniques -- Chapter 17 Hacker Techniques -- Introduction -- The Pre-Attack Phase -- The Attack Phase -- Countermeasures -- Conclusion -- Chapter 18 How Cyber Criminals Communicate -- Introduction.

Encryption -- Steganography -- Leet -- Meeting -- Conclusion -- Appendix A: Introduction to Computer Networks -- Introduction -- Network Basics -- The Physical Connection -- The Hub -- The Switch -- The Router -- The Data Packets -- IP Addresses -- Basic Network Utilities -- IPConfig -- ping and tracert -- Network Security Measures -- Appendix B: Glossary -- A -- B -- C -- D -- E -- F -- G-H -- I -- K-L -- M -- N -- P -- R -- S -- T -- U -- V -- W -- Z -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Z.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: