Record ID | marc_marygrove/marygrovecollegelibrary.full.D20191108.T213022.internetarchive2nd_REPACK.mrc:169922009:4422 |
Source | Marygrove College |
Download Link | /show-records/marc_marygrove/marygrovecollegelibrary.full.D20191108.T213022.internetarchive2nd_REPACK.mrc:169922009:4422?format=raw |
LEADER: 04422cam a2200505 a 4500
001 ocn122403027
003 OCoLC
005 20191109072404.9
008 070426s2007 maua 001 0 eng d
010 $a 2007296772
040 $aOCO$beng$cDLC$dOCO$dBAKER$dYDXCP$dBTCTA$dOSU$dUPM$dVRC$dCNNWL$dINHAR$dBDX$dNQB$dOCLCF$dOCLCO$dOCLCQ$dS3O$dOCLCQ$dERR$dOCLCQ
020 $a1597491330$q(pbk.)
020 $a9781597491334$q(pbk.)
024 1 $a792502913307
029 1 $aAU@$b000041602914
029 1 $aNZ1$b11327303
029 1 $aYDXCP$b2533953
035 $a(OCoLC)122403027
042 $alccopycat
050 00 $aHV8079.C65$bR49 2007
082 00 $a363.25/968$222
082 04 $a364.168$bR457c
049 $aMAIN
245 00 $aCyber crime investigations :$bbridging the gaps between security professionals, law enforcement, and prosecutors /$cAnthony Reyes [and others].
260 $aRockland, MA :$bSyngress Pub.,$c©2007.
300 $axix, 412 pages :$billustrations ;$c23 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
500 $aIncludes index.
505 0 $aThe problem at hand: The gaps in cyber crime law ; Unveiling the myths behind cyber crime ; Prioritzing evidence ; Setting the bar too high -- "Computer crime" discussed: Examing "computer crime" definitions ; Dissecting "computer crime" ; Using clear language to bridge the gaps -- Preparing for prosecution and testifying: Common misconceptions ; Chain of custody ; Keys to effective testimony ; Differences betwen civil and criminal cases -- Cyber investigative roles: Understanding your role as a cyber crime investigator ; The role of law enforcement officers ; The role of the prosecuting attorney -- Incident response : live forensics and investigations: Postmortem versus live forensics ; Today's live methods ; Case study : live versus postmortem ; Computer analysis for the Hacker Defender program ; Network analysis -- Legal issues of intercepting WiFi transmissions: WiFi technology ; Understanding WiFi RF ; Scanning RF ; Eavesdropping on WiFi ; Fourth Amendment expectation of privacy in WLANs -- Seizure of digital information: Defining digital evidence ; Digital evidence seizuer methodology ; Factors limiting the wholesale seizure of hardware ; Other options for seizing digital evidence ; Common threads within digital evidence seizure ; Determining the most appropriate seizure method -- Conducting cyber investigations: Demystifying computer/cyber crime ; Understanding IP addresses ; The explosion of networking ; The explosion of wireless networks ; Interpersonal communication -- Digital forensics and analyzing data: The evolution of computer forensics ; Phases of digital forensics -- Cyber crime prevention: Ways to prevent cyber crime targeted at you ; Ways to prevent cyber crime targeted at the family ; Ways to prevent cyber crime targeted at personal property ; Ways to prevent cyber crime targeted at a business ; Ways to prevent cyber crime targeted at an organization ; Ways to prevent cyber crime targeted at a government agency -- Appendix A: Legal pricniples for information security evaluations -- Appendix B: Investigating insider threat using enterprise security management.
520 $a"This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution. This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases; discusses the complex relationship between the public and private sector with regards to cyber crime; [and] provides essential information for IT security professionals and first responders on maintaining chain of evidence."--Publisher description.
590 $bInternet Archive - 2
590 $bInternet Archive 2
650 0 $aComputer crimes$xInvestigation.
650 7 $aComputer crimes$xInvestigation.$2fast$0(OCoLC)fst00872065
650 7 $aDatabrott.$2sao
700 1 $aReyes, Anthony.
856 42 $3Publisher description$uhttp://catdir.loc.gov/catdir/enhancements/fy0713/2007296772-d.html
938 $aBaker & Taylor$bBKTY$c59.95$d59.95$i1597491330$n0006975756$sactive
938 $aBrodart$bBROD$n06692397$c$59.95
938 $aBaker and Taylor$bBTCP$n2007296772
938 $aYBP Library Services$bYANK$n2533953
994 $a92$bERR
976 $a31927000828274