Wildy logo
(020) 7242 5778

Wildy’s Book News

Book News cover photo

Vol 23 No 6 June/July 2018

Book of the Month

Cover of Drafting Commercial Agreements

Drafting Commercial Agreements

Price: £110.00

Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...

Secondhand & Out of Print

Browse Secondhand Online


Sealy millman 2018 jp
Desmith out now
Data protection handbook

Investigating Computer-related Crime

Image not available lge

ISBN13: 9780849322181
ISBN: 0849322189
Published: April 2001
Publisher: Taylor & Francis Group
Format: Hardback
Price: Out of print

Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic techniques you need to preserve the security of your company's information.Investigating Computer-Related Crime discusses the nature of cyber crime, its impact in the 21st century, its investigation and the difficulties encountered by both public law enforcement officials and private investigators. By detailing an investigation and providing helpful case studies, this book offers insights into collecting and preserving evidence, interrogating suspects and witnesses, handling the crime in progress, and issues in involving the authorities. The seasoned author offers valuable, firsthand information on using the forensic utilities for preserving evidence and searching for hidden information, to help you devise solutions to the computer-related crimes that threaten the well-being of your company.

Image not available lge
Forward by Michael Anderson-New Technologies, Inc., Former Special Agent IRSPrefaceWhat This Book is AboutWho Should Read This BookTHE NATURE OF CYBER CRIMECyber Crime as We Enter the 21st CenturyWhat is Cyber Crime How Does Today's Cyber Crime Differ From the Hacker Exploits of Yesterday The Reality of Information Warfare in the Corporate EnvironmentIndustrial Espionage-Hackers For HirePublic Law Enforcement's Role in Cyber Crime InvestigationsThe Role of Private Cyber Crime Investigators and Security Consultants in InvestigationsThe Potential Impacts of Cyber CrimeData ThievesMisinformationDenial of ServiceRogue Code AttacksViruses, Trojan Horses and WormsLogic BombsResponding to Rogue Code AttacksProtection of Extended Mission Critical Computer SystemsSurgical Strikes and Shotgun BlastsSymptoms of a Surgical StrikeMasqueradingCase Study: The Case of the Cyber SurgeonSymptoms of Shotgun Blasts""Up Yours""-MailbombsData FloodsINVESTIGATING CYBER CRIMEA Framework for Conducting an Investigation of a Computer Security IncidentManaging IntrusionsWhy We Need an Investigative FrameworkWhat Should an Investigative Framework Provide Drawbacks for the Corporate InvestigatorA Generalized Investigative Framework for Corporate InvestigatorsLook for the Hidden FlawThe Human Aspects of Cyber Crime InvestigationMotive, Means and OpportunityThe Difference Between ""Evidence"" and ""Proof""Look for the Logical ErrorVanityAnalyzing the Remnants of a Computer Security IncidentWhat We Mean by a ""Computer Security Incident""We Never Get the Call Soon EnoughCyber Forensic Analysis-Computer Crimes Involving NetworksComputer Forensic Analysis-Computer Crimes at the ComputerSoftware Forensic Analysis-Who Wrote the Code The Limitations of System LogsThe Logs May Tell the Tale-But There are No LogsMultiple Log AnalysisLaunching an InvestigationSecuring the Virtual Crime SceneCollecting and Preserving EvidenceInterrogating and Interviewing Suspects and WitnessesDeveloping and Testing an Intrusion HypothesisInvestigating Alternative ExplanationsYou May Never Catch the CulpritDamage Control and ContainmentDetermining if a Crime Has Taken PlaceStatistically, You Probably Don't Have a CrimeBelieve Your IndicationsWhat Constitutes Evidence Using Tools to Verify That a Crime Has Occurred Unix Crash Dump Analysis Recovering Data From Damaged Disks Examining Logs-Special Tools Can Help Clues From Witness InterviewsMaintaining Crime Scene Integrity Until You Make a DeterminationCase Study: The Case of the CAD/CAM CadCase Study: The Case of the Client-ServerHandling the Crime in ProgressIntrusions-The Intruder is Still On-LineShould You Trap, Shut Down or Scare Off the Intruder Trap and Trace TechniquesLegal Issues in Trap and TraceStinging-Goat Files and Honey Pots""It Never Happened""-Cover-Ups are CommonCase Stu