商品簡介
Now in its second edition, this guide to computer crime and the technologies designed to prevent it provides an interesting balance between technical and legal discussion. Beginning with a chapter overview on cybercrime in general, it continues to analyze all aspects of the subject: computer forensic investigations and evidence, laws regulating access to evidence, seizure and cybercrime statutes in general; a discussion of computer networking environment and scams specific to it, and an introduction to cyber terrorism follows. Throughout, the legal discussion is peppered with technical details on specific software and procedures; discussion becomes more technical as the book goes on, with email and network forensics, procedures for corporate investigations, and use of mobile devices in computer forensics investigations in the latter part of the book. The concluding chapter describes possible pretrial and courtroom scenarios. Annotation c2014 Ringgold, Inc., Portland, OR (protoview.com)