Computer crime: a crimefighter's handbook

Front Cover
O'Reilly & Associates, 1995 - Computers - 437 pages
0 Reviews
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods.Computer Crime: A Crimefighter's Handbookis for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators.Part I of the book contains a discussion of computer crimes, the computer criminal, and computer crime laws. It describes the various categories of computer crimes and profiles the computer criminal (using techniques developed for the FBI and other law enforcement agencies). Part II outlines the the risks to computer systems and personnel, operational, physical, and communications measures that can be taken to prevent computer crimes. Part III discusses how to plan for, investigate, and prosecute computer crimes, ranging from the supplies needed for criminal investigation, to the detection and audit tools used in investigation, to the presentation of evidence to a jury.Part IV of the book contains a compendium of the computer-related U.S. federal statutes and all of the statutes of the individual states, as well as representative international laws. Part V contains a resource summary, detailed papers on computer crime, and a sample search warrant for a computer crime.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Overview
1
What Are the Crimes?
29
Who Commits Computer Crimes?
61
Copyright

16 other sections not shown

Common terms and phrases

References to this book

All Book Search results »

About the author (1995)

Karl A. Seger, Ph.D., has provided anti-terrorism consulting and training for all branches of the U.S. military, the Departments of Justice and the Treasury, and for the Federal Emergency Management Agency. He received a grant prior to the 1982 World's Fair in Knoxville, Tennessee to conduct a terrorism threat assessment for the event and to train local police in preparation for it. Dr. Seger assisted in the development of the Army's terrorism counteraction program in the 1980's and he was the contract writer for Tn9-16, Countering Terrorism on US Army Installations. This text was used by the Army's Terrorism Counteraction course from 1982 through 1995. He is the author of the Antiterrorism Handbook (Presidio Press, 1990), co-author of Computer Crime: An Investigator's Handbook (O'Reilly & Associates, 1995), and author of Utility Security: The New Paradigm (PennWell Books, 2003). Dr. Seger provides security training and
consulting services for government and corporate clients around the world.