ABSTRACT

Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the fi

chapter 2|20 pages

- The Potential Impacts of Cybercrime

chapter 3|18 pages

- Malware Attacks

chapter 4|20 pages

- Surgical Strikes and Shotgun Blasts

chapter 8|38 pages

- Launching the Investigation

chapter 9|24 pages

- Determining If a Crime Has Taken Place

chapter 10|12 pages

Cover-Ups Are Common

chapter 11|12 pages

Involving the Authorities

chapter 12|12 pages

- When an Investigation Cannot Continue

chapter 13|22 pages

- Building a Corporate Cyber “SWAT Team”

chapter 14|8 pages

- Privacy and Computer Crime

chapter 17|18 pages

- Using Evidence Effectively

chapter 18|20 pages

- Conducting Incident Postmortems