SCENE OF THE CYBERCRIME(2SECOND EDITION)豆瓣PDF电子书bt网盘迅雷下载电子书下载-霍普软件下载网

网站首页   软件下载   游戏下载   翻译软件   电子书下载   电影下载   电视剧下载   教程攻略   音乐专区

请输入您要查询的图书:

霍普软件下载网电子书栏目提供海量电子书在线免费阅读及下载。

电子书 SCENE OF THE CYBERCRIME(2SECOND EDITION)
分类 电子书下载
作者 MICHAEL CROSS
出版社 SYNGRESS PUBLISHING
下载 暂无下载
介绍
编辑推荐

This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must not be contaminated. It provides law enforcement officers with an understanding of the technical aspects of cybercrime and of how technology can be used to help solve crimes that have been committed.

内容推荐

Scene of the Cybercrime, Second Edition is a completely revised and updated book covering all of the technological,legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audiences;IT security professionals and members of law enforcement. It gives the technical experts insight into the world of law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless.It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute Cybercrimes.

目录

Chapter 1 Facing the Cybercrime Problem Head-On

 Introduction

 Defining Cybercrime

Understanding the Importance of Jurisdictional Issues

Quantifying Cybercrime

Differentiating Crimes That Use the Net from Crimes That Depend on the Net

Working toward a Standard Definition of Cybercrime

 Categorizing Cybercrime

Collecting Statistical Data on Cybercrime

Developing Categories of Cybercrimes

Prioritizing Cybercrime Enforcement

 Reasons for Cybercrimes

 Fighting Cybercrime

Determining Who Will Fight Cybercrime

Educating Cybercrime Fighters

Getting Creative in the Fight against Cybercrime

 Summary

 Frequently Asked Questions

Chapter 2 The Evolution of Cybercrime

Chapter 3 Understanding the People on the Scene

Chapter 4 Understanding the Technology

Chapter 5 The Computer Investigation Process

Chapter 6 Computer Forensic Softwaare and Hardware

Chapter 7 Acquiring Data,Duplicating Data,and Recovering Deleted Files

Chapter 8 iPod,Cell Phone,PDA,and BlackBerry Forensics

Chapter 9 Understanding E-mail and Internet Crimes

Chapter 10 Understanding Network Intrusions and Attacks

Chapter 11 Passwords,Vulnerabilities,and Exploits

Chapter 12 Understanding Cybercrime Prevention

Chapter 13 Implementing System Secrtity

Chapter 14 Implementing Cybercrime Detection Techniques

Chapter 15 Collecting and Preserving Digital Evidence

Chapter 16 Building the Cybercrime Case

Chapter 17 Becoming an Expert Witness

Index

截图
随便看

免责声明
本网站所展示的内容均来源于互联网,本站自身不存储、不制作、不上传任何内容,仅对网络上已公开的信息进行整理与展示。
本站不对所转载内容的真实性、完整性和合法性负责,所有内容仅供学习与参考使用。
若您认为本站展示的内容可能存在侵权或违规情形,请您提供相关权属证明与联系方式,我们将在收到有效通知后第一时间予以删除或屏蔽。
本网站对因使用或依赖本站信息所造成的任何直接或间接损失概不承担责任。联系邮箱:101bt@pm.me