Cybercrime and security

Front Cover
Alan E. Brill, Fletcher N. Baldwin, Robert John Munro
Oceana Publications, 1998 - Computers
Access the Security Management Strategies of Experts In this age of global electronic commerce, where transactions are conducted almost instantly, there is no greater threat to a company's success than the security of its data & information systems. This set will help you determine the best methods to secure your data, protect your communications infrastructure, & keep you up to date on the laws & regulations governing this area. Infrastructure Protection & Management Solutions This timely set examines security threats to your network & computer infrastructure & provides the measures taken by corporations & the U.S. government to manage the risk of Internet intrusion, computer viruses, & to secure critical infrastructure protection. Documents are presented examining regulation of the Internet & encryption technology on both the national & international levels. Covers Critical Issues in E-Commerce Including: * Cyberpayments, Collection of Digital Signatures, & Cryptography * Electronic Consumer Protection * Counterfeit Access Devices & Automated Cybercrimes * Prosecution of Violations of Intellectual Property Rights * Investigating & Prosecuting Network Intrusion * Collection & Handling Virtual Evidence Support for Law Enforcement & Security Management Professionals Articles & essays from recognized security professionals are included on a full range of issues, including computer forensics, data remanence, & the overall challenges to law enforcement by electronic communications & transactions via the Internet. Extensive management training & application tools are included along with case studies & checklists for practical application. Statutes, regulations, court opinions, administrative proceedings & a comprehensive bibliography & glossary are provided to illustrate strategies & tools useful for protecting information from the evolving tactics of cybercriminals. Federal guidelines for searching & seizing computers are included.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Table of Contents
3
Why put the e in eevidence?
10
What Information can be discovered?
16
Copyright

75 other sections not shown

Other editions - View all

Common terms and phrases

Bibliographic information