Digital Evidence and Computer Crime

Other | February 1, 2004

byCasey, Eoghan, Eoghan Casey

not yet rated|write a review
Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked,
collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime.
This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.
Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about:
* Components of computer networks
* Use of computer networks in an investigation
* Abuse of computer networks
* Privacy and security issues on computer networks
* The law as it applies to computer networks

* Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence
* Offers readers information about relevant legal issues
* Features coverage of the abuse of computer networks and privacy and security issues on computer networks
* Free unlimited access to author's Web site which includes numerous and frequently updated case examples

Pricing and Purchase Info

$81.79 online
$106.23 list price (save 23%)
In stock online
Ships free on orders over $25

From the Publisher

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.Though an increasing ...

Eoghan Casey is an internationally recognized expert in data breach investigations and information security forensics. He is founding partner of CASEITE.com, and co-manages the Risk Prevention and Response business unit at DFLabs. Over the past decade, he has consulted with many attorneys, agencies, and police departments in the United...

other books by Casey, Eoghan

see all books by Casey, Eoghan
Format:OtherDimensions:688 pages, 1 × 1 × 1 inPublished:February 1, 2004Publisher:Academic PressLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0080472508

ISBN - 13:9780080472508

Customer Reviews of Digital Evidence and Computer Crime

Reviews

Extra Content

Table of Contents

Part 1 - 1: Digital Evidence and Computer Crime; 2: History and Terminology of Computer Crime Investigation; 3: Technology and Law; 4: The Investigative Process; 5: Investigative Reconstruction; 6: Modus Operandi, Motive & Technology; 7: Digital Evidence in the Courtroom; Part 2 - 8: Computer Basics for Digital Evidence Examiners; 9: Applying Forensic Science to Computers; 10: Forensic Analysis of Windows Systems
Chapter 11: Forensic Analysis of Unix Systems; 12: Forensic Analysis of Macintosh Systems; 13: Forensic Analysis of Handheld Devices; Part 3 - 14: Network Basics for Digital Evidence Examiners; 15: Applying Forensic Science to Networks; 16: Digital Evidence on Physical and Data-Link Layers; 17: Digital Evidence on Network and Transport Layers; 18: Digital Evidence on the Internet; Part 4 - 19: Investigating Computer Intrusions; 20: Sex Offenders on the Internet; 21: Investigating Cyberstalking; 22: Digital Evidence as Alibi