High-technology-crime Investigator's Handbook: Working in the Global Information Environment

Front Cover
High Technoloty Crime Investigator's Handbook brings to light many high tech tools, advanced methods and streamlined applications that can be used to meet the investigative management challenges now and in the next century. The whole area of technological crime has become increasingly complex in today's business environment and this book responds to that reality.

*Emphasizes organizational and management issues when dealing with technology investigations
*Provides high tech tools, advanced methods, and applications
*Employs technology, management concepts, and marketing issues to bridge the investigative process
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Introduction to the HighTechnologyCrime
1
Chapter 13
39
The Global Information Infrastructure the Internet
41
Profiles Motives
55
The Basic Techniques Used by HighTechnology
71
The Basic Information Systems Security Techniques
95
Overview of the HighTechnologyCrime Investigations
113
Marketing Yourself as a Successful Investigator
137
Understanding the Role of the HighTechnologyCrime
153
The HighTechnologyCrime Investigations Units
165
HighTechnologyCrime Prevention and Investigative
173
HighTechnologyCrime Investigative Functions
183
HighTechnology Crimes and Investigations
231
Challenges
265
Recommended Websites for Reference
279
Copyright

The Global Enterprise Corporation
147

Other editions - View all

Common terms and phrases

About the author (2000)

Kovacich holds a bachelor's degree in Asian history and politics, a master's degree in social science, a master's degree in telecommunications management, and a doctorate degree in criminology. He has more than 36 years of industrial security, investigations, information systems security, and information warefare experience both in government and business. He is a Certified Fraud Examiner, Certified Protection Professional, and Certified Information Systems Security Professional.

Bibliographic information