Our society is dependent on computers. It is important that these computers are secure from unauthorized use. This book contains many real-life stories of hackers and computer criminals. Also covered is the need to guarantee the security of electronically stored information versus the rights of people to freedom and privacy. Includes glossary, chapter notes, a further reading list, and an index.
Using many riveting real-life crime stories to illustrate his points, he reveals: * Who your greatest security threats really are (be prepared for some surprises!) * Why employees undergoing divorce can be your organization's greatest ...
In L. Cherny and E. Wise (Eds.), Wired Women: Gender and NewRealities in Cyberspace,. Seattle, WA: Seal Press. Brenner, S.(2001). Defining Cybercrime: A Review of State and FederalLaw. In R.D. Clifford (Ed.), Cybercrime: The ...
This work defines cyber crime, introduces students to computer terminology and the history of computer crime, and includes discussions of important legal and social issues relating to computer crime.
This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence.
Computers reach into every aspect of our lives today, and as their use grows, so does the possibility of their abuse. This book is directly applicable and useful to virtually everyone working in all aspects of law enforcement.
This book introduces the future of criminal law. It covers every aspect of crime in the digital age, assembled together for the first time. Topics range from Internet surveillance law...
Fighting Computer Crime
A book that includes case studies and coverage of expert witnesses presents an overview of computer crime covering both legal and technical aspects and providing a broad overview of computer forensics, computer laws and computer-related ...
The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.
This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective.