Computer Forensics and Cyber Crime: An Introduction
This book fully defines computer-related crime and the legal issues involved in its investigation. It provides a framework for the development of a computer crime unit. This book is the "only" comprehensive examination of computer-related crime and its investigation on the market. It includes an exhaustive discussion of legal and social issues, fully defines computer crime, and provides specific examples of criminal activities involving computers, while discussing the phenomenon in the context of the criminal justice system. "Computer Forensics and Cyber Crime" provides a comprehensive analysis of current case law, constitutional challenges, and government legislation. For computer crime investigators, police chiefs, sheriffs, district attorneys, public defenders, and defense attorneys.
What people are saying - Write a review
We haven't found any reviews in the usual places.
addition agencies allows analysis application areas argued boot disks bulletin boards bytes child pornography Circuit computer crime computer forensics computer investigations computer system computer-related crime contained Court created crime scene criminal activity criminal evidence developed devices digital evidence diskettes documents e-mail ECPA electronic communications emerging employees encryption equipment example expectation of privacy fact Federal files floppy Fourth Amendment fraud hackers hacking hard drive hardware identify images increase individuals Internet involved lack Last accessed law enforcement legislation located manipulation master boot record materials monitoring Norton Utilities obscenity operating system partition passwords phreakers phreaking physical potential programs prohibitions prosecution protection puter require ruled scams sector seizure sexual specifically statutes steganography Steve Jackson Games storage stored suspect targeted theft tion traditional Unfortunately United users utilized victims virtual warrant Wiretap