Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods."Computer Crime: A Crimefighter's Handbook" is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators.Part I of the book contains a discussion of computer crimes, the computer criminal, and computer crime laws. It describes the various categories of computer crimes and profiles the computer criminal (using techniques developed for the FBI and other law enforcement agencies). Part II outlines the the risks to computer systems and personnel, operational, physical, and communications measures that can be taken to prevent computer crimes. Part III discusses how to plan for, investigate, and prosecute computer crimes, ranging from the supplies needed for criminal investigation, to the detection and audit tools used in investigation, to the presentation of evidence to a jury.Part IV of the book contains a compendium of the computer-related U.S. federal statutes and all of the statutes of the individual states, as well as representative international laws. Part V contains a resource summary, detailed papers on computer crime, and a sample search warrant for a computer crime.
Using many riveting real-life crime stories to illustrate his points, he reveals: * Who your greatest security threats really are (be prepared for some surprises!) * Why employees undergoing divorce can be your organization's greatest ...
This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence.
A book that includes case studies and coverage of expert witnesses presents an overview of computer crime covering both legal and technical aspects and providing a broad overview of computer forensics, computer laws and computer-related ...
This book introduces the future of criminal law. It covers every aspect of crime in the digital age, assembled together for the first time. Topics range from Internet surveillance law...
This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective.
Because holographs are difficult to make without the proper machinery the missing holographic image on a copied CD is a sure sign of potential software piracy. ENDNOTES 1. Kane v. McDaniel, 407 F.Supp. 1239, 1242 (D.C.Ky 1975) 2.
This work explains how computer networks function and how they can be used in a crime.
Fighting Computer Crime
Computer Crime Investigation
When it was first published in France in 1981, this book quickly became a best-seller and was avidly embraced by the popular press.