Cybercrime and Digital Forensics

  • Cybercrime and Digital Forensics: An Introduction
    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    Upper Saddle River,NJ: Pearson Prentice Hall. Holt, T.J. (2009b). The Attack Dynamics ofPolitical and Religiously Motivated Hackers. InT. Saadawi & L. Jordan (eds) Cyber Infrastructure Protection (pp. 161¥182).

  • Cybercrime and Digital Forensics: An Introduction
    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    The program was designed to create profiles of the Internet use of every public person online using various pieces of data that could be surreptitiously collected (Gallagher, 2015). It began in earnest in 2009 through the use of ...

  • Cybercrime and Digital Forensics: An Introduction
    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    ... Anthony detectives overlooked Google search. Retrieved March 19, 2014 from www.bigstory.ap.org Baier, H. (2011/2012). On the use of hash functions in computer forensics. Retrieved from https://www.fbi.h-da.de Barrios, R. M., ...

  • Cybercrime and Digital Forensics: An Introduction
    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    "Types of hardware, peripherals, and electronic evidence"--"Evidence integrity"--"Summary" -- "13 ACQUISITION AND EXAMINATION OF FORENSIC EVIDENCE" -- "Introduction" -- "Data preservation" -- "Digital forensic imaging tools" -- "Uncovering ...

  • Cybercrime and Digital Forensics: An Introduction
    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    Cyber bullying: Protecting kids and adults from online bullies. ABC-CLIO. Mit ell, K. J., Finkelhor, D., & Be er-Blease, K. A. (2007). Linking youth internet and conventional problems: Findings from a clinical perspective.