Items related to Computer Crime, Investigation, and the Law

Computer Crime, Investigation, and the Law - Softcover

  • 3.76 out of 5 stars
    17 ratings by Goodreads
 
9781435455320: Computer Crime, Investigation, and the Law

Synopsis

One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes.

"synopsis" may belong to another edition of this title.

About the Author

Chuck Easttom has many years of practical experience in all aspects of IT. He holds a Doctor of Science in CyberSecurity and 3 masters degrees. He has authored 27 computer science books ( so far) and is an inventor with 17 computer science patents, and numerous research papers on topics such as digital forensics, cyber warfare, engineering processes, cryptography, and other areas.
He was a subject matter expert forCompTIA in the creation of their Security+, Linux+, and Server+ certification tests and on the Job Task Analysis team for CEH v8. He created the OSForensics certification test and course.  He currently holds  over 40 ITcertifications (A+,Network+, iNet+, Linux+, Server+, MCP, MCAD, MCSA, MCSE,MCDBA,MCTS,MCITP, CEH, CHFI, CISSP, CCFP, ISSAP, and more).


Dr. Easttom is frequently a speaker on computer science related topics,often specifically on computer security and related subjects. In the past he has beena speaker at: Hacker Halted, TakedownCon, Secure World, ISC2Security Congress,Harvard Computer Society, Columbia University ACM chapter, University of Texas at Dallas ACM Chapter, Southern Methodist University Research Colloquium, Hakon India, Defcon, Enfuse,to name a few. He has spoken on the history of viruses,cryptographic back doors, cryptanalysis, cyber warfare and terrorism,  thedetails  of the RSA algorithm, forensic report writing, Feistel ciphers,and other computer security topics.  He is also a Distinguished Speaker of the ACM, as well as a Senior Member of the ACM  and a Senior Member of the IEEE and a member of INCOSE and IACR.  He currently is a professor at Capitol Technology University and is the Director of their Quantum Computing and Cryptography Research Center You can find book errata at chuckeasttom.com/errata.htm

You can find his research at chuckeasttom.com/research.htm
You can find out more about the author, inventor, computer scientist atChuckEasttom.com

Review

PART I: COMPUTER CRIME. 1: Introduction to computer crime. 2: A history of computer crime in America. 3: United States Computer laws Part I. 4: United States Computer laws Part II. 5: Techniques and resources of computer crime. 6: Organized computer crime and terrorism. PART II: COMPUTER FORENSICS. 7: Introduction to computer forensics. 8: Collecting evidence from hardware. 9: Collecting evidence from the operating system. 10: Collecting evidence from other sources. PART III: LITIGATION. 11: Experts and Expert Reports. 12: Depositions and Trials. 13: Civil matters relating to computer crime. PART IV: COMPUTER CRIME AND INDIVIDUALS. 14: Protecting Children on the Internet. 15: How to protect your identity on the Internet. 16: Harassment and Stalking via the computer. Appendices. Appendix a: Introduction to computer networks. Appendix b: How to find a computer security expert.

"About this title" may belong to another edition of this title.

  • PublisherCengage Learning PTR
  • Publication date2010
  • ISBN 10 1435455320
  • ISBN 13 9781435455320
  • BindingPaperback
  • LanguageEnglish
  • Edition number1
  • Number of pages576
  • Rating
    • 3.76 out of 5 stars
      17 ratings by Goodreads

Buy Used

Condition: Good
Missing dust jacket; Pages can... View this item

Shipping: FREE
Within U.S.A.

Destination, rates & speeds

Add to basket

Other Popular Editions of the Same Title

9781305507333: Computer Crime, Investigation, and the Law

Featured Edition

ISBN 10:  1305507339 ISBN 13:  9781305507333
Publisher: Cengage Learning PTR, 2015
Softcover

Search results for Computer Crime, Investigation, and the Law

Stock Image

Easttom, Chuck; Taylor, Jeff
Published by Cengage Learning, 2010
ISBN 10: 1435455320 ISBN 13: 9781435455320
Used Paperback

Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Good. No Jacket. Missing dust jacket; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.4. Seller Inventory # G1435455320I3N01

Contact seller

Buy Used

US$ 7.98
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Easttom, Chuck; Taylor, Jeff
Published by Cengage Learning, 2010
ISBN 10: 1435455320 ISBN 13: 9781435455320
Used Paperback

Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.4. Seller Inventory # G1435455320I4N00

Contact seller

Buy Used

US$ 7.98
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Easttom, Chuck
Published by Delmar Cengage Learning, 2010
ISBN 10: 1435455320 ISBN 13: 9781435455320
Used Softcover

Seller: Better World Books, Mishawaka, IN, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Good. Used book that is in clean, average condition without any missing pages. Seller Inventory # 9819003-6

Contact seller

Buy Used

US$ 8.57
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Chuck Easttom
Published by Cengage Learning PTR, 2010
ISBN 10: 1435455320 ISBN 13: 9781435455320
New Paperback

Seller: BennettBooksLtd, North Las Vegas, NV, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: New. In shrink wrap. Looks like an interesting title! Seller Inventory # Q-1435455320

Contact seller

Buy New

US$ 101.57
Convert currency
Shipping: US$ 6.95
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket