Computer crime, investigation, and the law /
"If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, t...
Основен автор: | Easttom, Chuck. |
---|---|
Други автори: | Taylor, Jeffrey. |
Формат: | Електронна книга |
Език: | English |
Публикувано: |
Boston, Mass. :
Course Technology PTR/Cengage Learning,
℗♭2011.
|
Предмети: | |
Онлайн достъп: |
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=318532 |
Подобни документи: |
Print version::
Computer crime, investigation, and the law. |
Съдържание:
- Computer crime
- Introduction to computer crime
- A history of computer crime in America
- United States computer laws part I
- United States computer laws part II
- Techniques and resources for computer crime
- Organized crime and cyber terrorism
- Computer forensics
- Observing, Collecting, Documenting, and Storing Electronic Evidence
- Collecting Evidence from Hardware
- Collecting Evidence from the Operating System
- Collecting Evidence from Other Sources
- Litigation
- Experts and Expert Reports
- Depositions and Trials
- Civil Matters Relating to Computer Crime
- Computer Crime and Individuals
- Protecting Children on the Internet
- How to Protect Your Identity on the Internet
- Harassment and Stalking Via the Computer
- Techniques
- Hacker Techniques
- How Cyber Criminals Communicate.