Computer Forensics and Cyber Crime: An IntroductionFor undergraduate introductory courses in Computers in Criminal Justice, Forensic Science, Criminal Investigation, White Collar Crime, and Computer Crime. This one-of-a-kind text introduces students to computer crime and the techniques used to investigate computer crimes. "Computer Forensics and Cyber Crime" defines cyber crime, introduces students to computer terminology and the history of computer crime, and includes discussions of important legal and social issues relating to computer crime. The text also covers computer forensic science, providing students with cutting-edge techniques used to investigate computer crime scenes as well as computer hardware and software to solve computer crimes. |
Contents
INTRODUCTION | 1 |
COMPUTER TERMINOLOGY AND HISTORY | 15 |
HISTORY OF CRIME AND COMPUTER CRIME | 30 |
Copyright | |
16 other sections not shown
Other editions - View all
Common terms and phrases
addition agencies allows analysis application areas argued boot disks bulletin boards bytes child pornography Circuit computer crime computer forensics computer investigations computer system computer-related crime Court created crime scene criminal activity criminal evidence developed devices digital evidence diskettes documents e-mail ECPA electronic communications emerging employees enables investigators encryption equipment example expectation of privacy fact Federal files floppy Fourth Amendment fraud hackers hacking hard drive hardware identify images increase individuals Internet involved lack Last accessed law enforcement legislation located manipulation master boot record materials monitoring Norton Utilities obscenity operating system partition passwords phreakers phreaking physical potential programs prohibitions prosecution protection puter require ruled scams sector seizure sexual specifically statutes steganography Steve Jackson Games storage stored targeted theft tion traditional Unfortunately United users utilized victims virtual virus warrant Wiretap