Computer Crime, Investigation, and the Law

Computer Crime, Investigation, and the Law

by Chuck Easttom, Jeff Taylor
Computer Crime, Investigation, and the Law

Computer Crime, Investigation, and the Law

by Chuck Easttom, Jeff Taylor

eBook

$34.99 

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

This thoroughly updated edition of COMPUTER CRIME, INVESTIGATION, AND THE LAW provides a comprehensive overview of computer forensics, computer laws, and computer-related trials--written to be accessible to the layman as well as the professional. This revised edition includes new and expanded coverage of current computer laws and hacking techniques, as well as updates to sections covering evidence collection, litigation, and more. Unlike other books in this field, it covers a combination of both technical and legal aspects. It also includes numerous real-world case studies and coverage of expert witnesses. Keep up with this burgeoning high-tech/legal field with COMPUTER CRIME, INVESTIGATION, AND THE LAW, SECOND EDITION.

Product Details

ISBN-13: 9781435456105
Publisher: Course Technology PTR
Publication date: 01/04/2010
Sold by: CENGAGE LEARNING
Format: eBook
File size: 7 MB

About the Author


Chuck Easttom has 15 years' experience in the IT industry and has been an expert witness on several computer-related cases. He is the author of ten computer-science books including two textbooks on computer security. He was also one of the subject matter experts who helped to create CompTIA's Security+ certification test. He has been a frequent guest speaker on computer security at various computer groups and campuses including Harvard and Columbia. He holds more than a dozen computer industry certifications.

Jeff Taylor is a McKinney, Texas, police detective who began his law-enforcement career in 1982. He is currently assigned to the Criminal Investigations unit, where he specializes in white-collar crimes. In 2003, Detective Taylor became certified in computer-forensic evidence recovery. He uses various computer software systems, including EnCase, Helix, and I-Look. He has received training and certifications from the FBI, Cyber Evidence Inc., the National White Collar Crime Center, and the High Intensity Drug Trafficking Area (HIDTA) task force. Detective Taylor is on the instructor staff at the Collin County Law Enforcement Academy, where he teaches a course on electronic crime scene investigations.

Table of Contents


Section I: COMPUTER CRIME. 1. Introduction to computer crime. 2. A history of computer crime in America. 3. United States Computer laws Part I. 4. United States Computer laws Part II. 5. Techniques and resources of computer crime. 6. Organized computer crime and terrorism. Section II: COMPUTER FORENSICS. 7. Introduction to computer forensics. 8. Collecting evidence from hardware. 9. Collecting evidence from the operating system. Chapter10. Collecting evidence from other sources. Section III: LITIGATION. 11. Experts and Expert Reports. 12. Depositions and Trials. 13. Civil matters relating to computer crime. Section IV: COMPUTER CRIME AND INDIVIDUALS. 14. Protecting Children on the Internet. 15. How to protect your identity on the Internet. 16. Harassment and Stalking via the computer. Section V Techniques. 17. Hacking Techniques. Appendices. Appendix A. Introduction to computer networks. Appendix B. Glossary.
From the B&N Reads Blog

Customer Reviews