Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods.Computer Crime: A Crimefighter's Handbook is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators.Part I of the book contains a discussion of computer crimes, the computer criminal, and computer crime laws. It describes the various categories of computer crimes and profiles the computer criminal (using techniques developed for the FBI and other law enforcement agencies). Part II outlines the the risks to computer systems and personnel, operational, physical, and communications measures that can be taken to prevent computer crimes. Part III discusses how to plan for, investigate, and prosecute computer crimes, ranging from the supplies needed for criminal investigation, to the detection and audit tools used in investigation, to the presentation of evidence to a jury.Part IV of the book contains a compendium of the computer-related U.S. federal statutes and all of the statutes of the individual states, as well as representative international laws. Part V contains a resource summary, detailed papers on computer crime, and a sample search warrant for a computer crime.
"synopsis" may belong to another edition of this title.
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods. This book is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators. Also included is the text of U.S. federal, state, and international computer crime laws.
Karl A. Seger, Ph.D., has provided anti-terrorism consulting and training for all branches of the U.S. military, the Departments of Justice and the Treasury, and for the Federal Emergency Management Agency. He received a grant prior to the 1982 World's Fair in Knoxville, Tennessee to conduct a terrorism threat assessment for the event and to train local police in preparation for it. Dr. Seger assisted in the development of the Army's terrorism counteraction program in the 1980's and he was the contract writer for TC19-16, Countering Terrorism on US Army Installations. This text was used by the Army's Terrorism Counteraction course from 1982 through 1995. He is the author of the Antiterrorism Handbook (Presidio Press, 1990), co-author of Computer Crime: An Investigator's Handbook (O'Reilly & Associates, 1995), and author of Utility Security: The New Paradigm (PennWell Books, 2003). Dr. Seger provides security training and
consulting services for government and corporate clients around the world. 9
Karl A. Seger, Ph.D., has provided anti-terrorism consulting and training for all branches of the U.S. military, the Departments of Justice and the Treasury, and for the Federal Emergency Management Agency. He received a grant prior to the 1982 World's Fair in Knoxville, Tennessee to conduct a terrorism threat assessment for the event and to train local police in preparation for it. Dr. Seger assisted in the development of the Army's terrorism counteraction program in the 1980's and he was the contract writer for TC19-16, Countering Terrorism on US Army Installations. This text was used by the Army's Terrorism Counteraction course from 1982 through 1995. He is the author of the Antiterrorism Handbook (Presidio Press, 1990), co-author of Computer Crime: An Investigator's Handbook (O'Reilly & Associates, 1995), and author of Utility Security: The New Paradigm (PennWell Books, 2003). Dr. Seger provides security training and
consulting services for government and corporate clients around the world.
Karl A. Seger, Ph.D., has provided anti-terrorism consulting and training for all branches of the U.S. military, the Departments of Justice and the Treasury, and for the Federal Emergency Management Agency. He received a grant prior to the 1982 World's Fair in Knoxville, Tennessee to conduct a terrorism threat assessment for the event and to train local police in preparation for it. Dr. Seger assisted in the development of the Army's terrorism counteraction program in the 1980's and he was the contract writer for TC19-16, Countering Terrorism on US Army Installations. This text was used by the Army's Terrorism Counteraction course from 1982 through 1995. He is the author of the Antiterrorism Handbook (Presidio Press, 1990), co-author of Computer Crime: An Investigator's Handbook (O'Reilly & Associates, 1995), and author of Utility Security: The New Paradigm (PennWell Books, 2003). Dr. Seger provides security training and
consulting services for government and corporate clients around the world.
"About this title" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Shipping:
US$ 4.25
Within U.S.A.
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 38840209-6
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.7. Seller Inventory # G1565920864I4N00
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 1.7. Seller Inventory # G1565920864I5N00
Quantity: 1 available
Seller: Wonder Book, Frederick, MD, U.S.A.
Condition: Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Seller Inventory # A01J-00490
Quantity: 1 available
Seller: Wonder Book, Frederick, MD, U.S.A.
Condition: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Seller Inventory # F09A-03086
Quantity: 1 available
Seller: Bookmans, Tucson, AZ, U.S.A.
Paperback. Condition: Good. Satisfaction 100% guaranteed. Seller Inventory # mon0001833286
Quantity: 1 available
Seller: GoldenDragon, Houston, TX, U.S.A.
Paperback. Condition: very good. Very Good Copy. Fast Shipment. Seller Inventory # SilverDragon1565920864
Quantity: 1 available
Seller: GoldBooks, Denver, CO, U.S.A.
Paperback. Condition: very good. Very Good Copy. Customer Service Guaranteed. Seller Inventory # think_very_1565920864
Quantity: 1 available
Seller: AwesomeBooks, Wallingford, United Kingdom
Paperback. Condition: Very Good. Computer Crime: A Crimefighter's Handbook (Computer security series) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 7719-9781565920866
Quantity: 1 available
Seller: Bahamut Media, Reading, United Kingdom
Paperback. Condition: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 6545-9781565920866
Quantity: 1 available