T&F logoTaylor & Francis Group logoTaylor & Francis Group logo
Search all titles
  • Search all titles

  • Search all collections

  • Login
  • Hi, User  
    • Your Account

    • Logout

  • Search all titles
  • Search all collections
loading

Investigating Computer-Related Crime

DOI link for Investigating Computer-Related Crime

Investigating Computer-Related Crime book

Investigating Computer-Related Crime

DOI link for Investigating Computer-Related Crime

Investigating Computer-Related Crime book

ByPeter Stephenson, Keith Gilbert
Edition 1st Edition
First Published 1999
eBook Published 28 September 1999
Pub. location New York
Imprint Routledge
DOI https://doi.org/10.1201/9781420048872
Pages 328 pages
eBook ISBN 9780429248818
SubjectsComputer Science
Share
Share

Get Citation

Stephenson, P., Gilbert, K. (2000). Investigating Computer-Related Crime. New York: Routledge, https://doi.org/10.1201/9781420048872

Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic techn

TABLE OF CONTENTS

chapter |2 pages

Section 1: The Nature of Cyber Crime

chapter 1|12 pages

Cyber Crime as We Enter the Twenty-First Century

chapter 2|16 pages

The Potential Impacts of Cyber Crime

chapter 3|14 pages

Rogue Code Attacks

chapter 4|16 pages

Surgical Strikes and Shotgun Blasts

chapter |2 pages

Section 2: Investigating Cyber Crime

chapter 5|18 pages

A Framework for Conducting an Investigation of a Computer Security Incident

chapter 6|14 pages

Look for the Hidden Flaw

chapter 7|26 pages

Analyzing the Remnants of a Computer Security Incident

chapter 8|28 pages

Launching the Investigation

chapter 9|22 pages

Determining If a Crime Has Taken Place

chapter 10|16 pages

Handling the Crime in Progress

chapter 11|10 pages

“It Never Happened” — Cover-Ups Are Common

chapter 12|10 pages

Involving the Authorities

chapter 13|8 pages

When an Investigation Can’t Continue

chapter |2 pages

Section 3: Preparing for Cyber Crime

chapter 14|18 pages

Building a Corporate Cyber “SWAT Team”

chapter 15|8 pages

Privacy and Computer Crime

chapter |2 pages

Section 4: Using the Forensic Utilities

chapter |2 pages

Preface — How the Section Is Organized

chapter 16|6 pages

Preserving Evidence — Basic Concepts

chapter 17|6 pages

Collecting Evidence — First Steps

chapter 18|8 pages

Searching for Hidden Information

chapter 19|2 pages

Handling Floppy Disks

T&F logoTaylor & Francis Group logo
  • Policies
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
  • Journals
    • Taylor & Francis Online
    • CogentOA
    • Taylor & Francis Online
    • CogentOA
  • Corporate
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
  • Help & Contact
    • Students/Researchers
    • Librarians/Institutions
    • Students/Researchers
    • Librarians/Institutions

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2019 Informa UK Limited