Digital evidence - evidence that is stored on or transmitted by computers - can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about: components of computer networks; use of computer networks in an investigation; abuse of computer networks; privacy and security issues on computer networks; the law as it applies to computer networks; provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. It offers readers information about relevant legal issues; and features coverage of the abuse of computer networks and privacy and security issues on computer networks.
"synopsis" may belong to another edition of this title.
Cybercrime--the use of computers for criminal activity--is a becoming a hot subject right now, and Digital Evidence and Computer Crime is one of the first books to explain exactly what it means. This title considers cybercrimes such as e-mail defrauding, harassment in chat rooms, "spoofing", and "cracking" of computer networks. The author explains where the digital evidence is left, how it can be gathered with minimal distortion and how it can be used legally.
The book is stylishly formatted and easy to read. The main text is interspersed with fascinating case examples--such as the murderer caught at a library because the computer he always used there was traced, or the Colonel who remembered to shred all his documents and delete all e-mail, but didn't realise that backups were regularly made . . .
The author, Eoghan Casey, has designed this book for computer security professionals, law enforcement officers, attorneys and forensic scientists, but it is likely that all those with an interest in the role of computers in crime will find this an interesting read. The book only disappoints on two fronts. First, although much detail is provided on what should be done to gather and use digital evidence, very little technical information is given on how to do it. Secondly, and more seriously, this book makes no mention of the most recent and potentially costly form of cybercrime--fraudulent activity in electronic commerce systems. It would have been nice to hear about some of the automatic data-mining techniques being developed to find these crimes in large databases. However, Casey does a thorough job of explaining the more "traditional" types of cybercrime, and Digital Evidence and Computer Crime is recommended for those new to the field as an excellent introductory text. --Dr. Peter J BentleyReview:
Reviews for the previous edition: "Digital Evidence and Computer Crime provides an introduction to many concepts from computer science about networks, and in particular the Internet. It details the application of forensic science principles to the location, recovery, and examination of digital evidence...Each chapter in the book is fully supported by case examples to clarify particular points made. It also contains many references to specialized literature and on-line resources as well as a helpful glossary of terms...this book can be recommended mainly for people looking to expand their general knowledge and awareness of computer crime and the process of computer crime investigation, particularly those just entering the field of digital forensics." --Dr. L.W. Russell, Science & Justice "Many, perhaps most, of the police, lawyers or systems administrators and forensic scientists involved in investigation or prosecution of computer-related crimes do not know the answer to these questions [of digital evidence handling]. This book will tell them. It should, of course, be equally interesting to lawyers with the task of defending alleged computer criminals." --Robert L Dunne, JD, The Center for Internet Studies, Yale University, USA "...an excellent book that details the elements of digital crime. Author Eoghan Casey does a superb job of applying forensic science to computers. The information presented here is critical to a diverse audience: law enforcement, attorneys, forensic scientists, and systems administrators, for instance...In all, the book and CD are an excellent introduction to an increasingly important area of law enforcement." -- Ben Rothke, SecurityManagement I would very highly recommend this book to all those professionals who want to venture into the new and exciting branch of computer forensics. This book is good value for money, and should adorn the bookshelves of all computer experts, especially those who are in computer forensics. - Internet Journal of Forensic Medicine Reviews for 2nd Edition: This behemoth of a book offers more than 680 pages of useful information on digital forensics and computer crime. There's something for everyone - law enforcement agencies that collect and process evidence, forensic analysts, lawyers and other information security professionals. ...Casey does a great job making difficult concepts easy to understand. The tools and methodology described are up to date and relevant, and the case studies are detailed perfectly. This book is a great reference for any security professional facing issues in this area. - ComputerWorld
"About this title" may belong to another edition of this title.
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801216310481.0
Book Description Hardcover. Book Condition: BRAND NEW. BRAND NEW. Fast Shipping. Prompt Customer Service. Satisfaction guaranteed. Bookseller Inventory # 0121631044BNA
Book Description Academic Press, 2004. Hardcover. Book Condition: New. book. Bookseller Inventory # 0121631044
Book Description Academic Press, 2004. Hardcover. Book Condition: New. Bookseller Inventory # P110121631044
Book Description Academic Press, 2004. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: I. IntroductionII. When a Little Becomes Much: Religious Resources in ActionIII. Prophetic Fragments: Macro and Micro Foundations of Religious ResourcesIV. Religion Reconsidered: Black Protest and Electoral Activism in an Age of TransformationV. Blessed Assurance: Religion, Personal Empowerment, and African-American Political ActivismVI. Rock in a Weary Land: Religion Institutions and African-American Political ActivismVII. Ties That Bind: Organizational and Psychological Dynamics of Religious ResourcesVIII. The Last Shall Be First: Religion, Oppositional Culture, and African-American Political MobilizationIX. In My Father's House: Religion and Gender in African-American Political LifeX. (Epilogue) It Remains to be Seen: Stability and Change in Religion and African-American PoliticsAppendicesNotesBibliographyIndex. Bookseller Inventory # ABE_book_new_0121631044