E-Book, Englisch, 470 Seiten
Kovacich CFE / Boni CISA High-Technology Crime Investigator's Handbook
2. Auflage 2011
ISBN: 978-0-08-046820-4
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Establishing and Managing a High-Technology Crime Prevention Program
E-Book, Englisch, 470 Seiten
ISBN: 978-0-08-046820-4
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
* Provides an understanding of the global information environment and its threats
* Explains how to establish a high-technology crime investigations unit and prevention program
* Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers
Dr. Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security experience in both government as a special agent and as a manager in international corporations. Dr. Kovacich currently resides on an island in Washington state where he continues to write, lecture and conduct research relative to information systems security, information warfare defensive and offensive operations, high-technology crime and techno-terrorism.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;High-Technology Crime Investigator's Handbook;6
3;Copyright Page;7
4;Contents;10
5;Praise for the First Edition ;12
6;First Edition Foreword;14
7;Second Edition Foreword;18
8;Preface;22
9;Acknowledgments ;26
10;About the Authors ;28
11;Part I: Introduction to the High-Technology Crime Environment;30
11.1;Chapter 1. What Investigators Should Know About the High-Technology-Supported Global Environment and Its Threats;32
11.2;Chapter 2. High-Technology Crime Miscreants: Profiles, Motives, and Philosophies;52
11.3;Chapter 3. The Basic Techniques Used by High-Technology Crime Miscreants;78
11.4;Chapter 4. The Basic Information Systems Security Techniques Used to Defend Against High-Technology Crime Miscreants;106
12;Part II: High-Technology Crime Incidents and Crime Investigations;126
12.1;Chapter 5. Investigating High-Technology Crimes ;128
12.2;Chapter 6. Responding to High-Technology Incidents and Crimes;144
12.3;Chapter 7. The Collection of Evidence;166
12.4;Chapter 8. Interviews and Interrogations;178
12.5;Chapter 9. An Introduction to Computer Forensics;192
12.6;Chapter 10. Establishing and Managing a Computer Forensics Laboratory;212
12.7;Chapter 11. High-Technology Crimes: Case Summaries;230
13;Part III: Overview of the High-Technology Crime Investigation Profession and Unit;262
13.1;Chapter 12. The Global Enterprise Corporation;266
13.2;Chapter 13. Understanding the Role of the High-Technology Crime Investigation and a Crime Prevention Unit in the Business and Management Environment;274
13.3;Chapter 14. The High-Technology Crime Investigation Unit’s Strategic, Tactical, and Annual Plans;288
13.4;Chapter 15. High-Technology Crime Investigation Program and Organization;298
13.5;Chapter 16. High-Technology Crime Investigative Functions;314
13.6;Chapter 17. Sources, Networking, and Liaison;360
13.7;Chapter 18. High-Technology Crime Investigation Unit Metrics Management System;370
13.8;Chapter 19. Outsource or Proprietary?;384
14;Part IV: High-Technology Crime Investigation Challenges of the 21st Century;402
14.1;Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment;404
14.2;Chapter 21. The Future of High-Technology Crimes, Security, and the Criminal Justice System;412
14.3;Chapter 22. Terrorism—Crime or War? Its Impact on the High-Technology Crime Investigator and the Profession;422
14.4;Chapter 23. The Future of the High-Technology Crime Investigator Profession;434
14.5;Chapter 24. Developing a Career as a High-Technology Crime Investigator;448
14.6;Chapter 25. Marketing Yourself as a Successful High-Technology Crime Investigator;454
14.7;Chapter 26. So, Are You Ready to Become a High-Technology Crime Investigation Consultant?;466
14.8;Chapter 27. Conclusions and Final Thoughts;478
15;Index ;482




