Computer Forensics and Cyber Crime: An Introduction (3e) : 9780132677714

Computer Forensics and Cyber Crime: An Introduction (3e)

 
Edition
 
3
ISBN
 
9780132677714
ISBN 10
 
0132677717
Published
 
16/05/2013
Published by
 
Pearson Higher Ed USA
Pages
 
408
Format
 
Out of stock
 
Title type
Book
$109.99
 
 
 
Description

For all courses covering computer crime at community colleges, universities, and police academies; no previous exposure to technological studies is required.

 

COMPUTER FORENSICS AND CYBER CRIME: AN INTRODUCTION, 3/e is the only book on computer crime that has been widely adopted by both academics and practitioners, this pioneering text thoroughly discusses computer crime in non-technological language while presenting all basic modern procedures needed to investigate and prosecute it. Organized in thirteen chapters, it enables professors to address one chapter per week in a typical semester. The author fully covers both forensic and legal issues, addressing the First and Fourth Amendments, US Patriot Act, international collaborations, identity theft, and much more. This significantly rewritten Third Edition builds on earlier editions' proven pedagogy, adding up-to-the-minute coverage of emerging issues ranging from SmartPhones, GPS navigation, and cloud computing to cyberbullying and cyberterrorism.

Table of contents

1. Introduction and Overview of Computer Forensics and Cybercrime

2. Computer Terminology and History

3. Traditional Computer Crime: Early Hackers and Theft of Components

4. Contemporary Computer Crime

5. Identity Theft and Identity Fraud

6. Terrorism and Organized Crime

7. Avenues for Prosecution and Government Efforts

8. Applying the 1st Amendment to Computer-Related Crime

9. The 4th Amendment and Other Legal Issues

10. Computer Forensics: Terminology and Requirements

11. Searching and Seizing Computer Related Evidence

12. Processing of Evidence and Report Preparation

13. Conclusions and Future Issues

New to this edition

Thoroughly updated with new case studies, events, statistics, and discussions that reflect emerging attacks, evolving laws, and the latest investigatory techniques.

 

New! New examples, events, case studies, and statistics throughoutincluding new examples and statistics related to hacking, computer fraud, identity theft, and much more
  • Gives students the latest and most relevant information
  • Links key concepts to events that students may have recently encountered in the popular media 
New! Covers the latest case law and legislationincluding new or updated discussions of Bill of Rights protections, warranted and warrantless searches, expectation of privacy, probable cause, the exclusionary rule, the PROTECT Act, online anti-gambling statutes, and more
  • Helps students investigate computer crime without violating current statutes, and utilize all the resources current case law and legislation provide 

New! "Case in Points" text boxes—illuminate key concepts and principles with realistic examples

  • Help students gain a deeper and more realistic understanding of relevant legal concepts and investigatory techniques 

New! Extensive new coverage of emerging technologies—including smartphones, cloud computing, GPS, and more

  • Helps students anticipate new and emerging issues they will encounter as they move into the field 

New! Fully covers non-Windows operating systems—including Apple Mac OS X and iOS, Unix, and Linux

  • Prepares students for emerging security issues associated with the increased use of non-Windows operating systems and devices 

Updated! Revised and updated coverage of forensic tools and best practices—reflecting new resources and more effective techniques

  • Helps students begin their careers already using the best available tools, resources, and techniques 

Updated and Expanded! More and better coverage of computer-related terrorism and warfare—including planning, recruitment, and propaganda; attacks on Estonia; Netwar; the Stuxnet worm; and more

  • Helps students recognize computer crime that may be related to international terrorism or warfare, and participate in investigating it 

Expanded! Updated and improved coverage of cyberbullying—and related topics

  • Prepares students to investigate cyberbullying and prosecute it wherever appropriate
Features & benefits

For all courses covering computer crime at community colleges, universities, and police academies; no previous exposure to technological studies is required.

 

COMPUTER FORENSICS AND CYBER CRIME: AN INTRODUCTION, 3/e is the only book on computer crime that has been widely adopted by both academics and practitioners, this pioneering text thoroughly discusses computer crime in non-technological language while presenting all basic modern procedures needed to investigate and prosecute it. Organized in thirteen chapters, it enables professors to address one chapter per week in a typical semester. The author fully covers both forensic and legal issues, addressing the First and Fourth Amendments, US Patriot Act, international collaborations, identity theft, and much more. This significantly rewritten Third Edition builds on earlier editions' proven pedagogy, adding up-to-the-minute coverage of emerging issues ranging from SmartPhones, GPS navigation, and cloud computing to cyberbullying and cyberterrorism.

 

HALLMARK FEATURES

 

Provides turnkey support for a complete course on computer-related investigations and forensics. Brings together all the resources instructors need, including course outlines, discussion questions, key terms, instructor’s edition, and PowerPoint presentations.

  • Helps instructors teach courses in computer crime and forensics far more efficiently 

Organized to simplify and support instruction across a typical semester. Presented in thirteen chapters designed to be taught one chapter per week across a typical semester.

  • Simplifies course organization and makes both teaching and learning more intuitive 

Brings together all the computer terminology, history, and context that students need. Gets students up-to-speed on the basics of computers and networks, so they can quickly understand how computer crimes "work" and how they are investigated.

  • Supports students even if they have little or no technical knowledge or experience. 

Teaches through realistic case studies and examples. Utilizes up-to-date examples to illuminate key concepts, techniques, and legal principles throughout.

  • Makes it easier to understand computer crimes and their successful investigation and prosecution. 

Covers all forms of computer crime, both traditional and new. Includes detailed coverage of identity theft, computer fraud, e-fencing, fraudulent instruments, and many other forms of computer crime.

  • Helps students understand the full spectrum of computer crime against individuals and organizations. 

Shows how computer crime is linked to terrorism and organized crime. Illuminates the growing power and complexity of organized computer crime.

  • Shows students that computer crime is no longer primarily an individual activity, and demonstrates how it has connected with larger criminal networks.

Thoroughly discusses all key legal issues associated with computer forensics and cyber crime. Includes extensive explorations of the First and Fourth amendments, the US Patriot Act, and other foundational legal principles and statutes.

  • Prepares students to investigate computer crime without violating the law or citizens' constitutional rights. 

Fully addresses search and seizure and other crucial practical issues. Prepares students to participate effectively in actual investigations.

  • Helps students immediately become productive and reliable members of investigatory teams.
Author biography

Dr. Marjie T. Britz is a professor of criminal justice at Clemson University.  She holds a bachelors of science in forensic science from Jacksonville State University, a masters of science in police administration, and a doctorate of philosophy in criminal justice from Michigan State University.  She has published extensively in the areas of computer crime, organized crime, and the police subculture.  She has acted as a consultant to a variety of organizations and provided training to an assortment of law enforcement agencies. In addition, she has served on editorial and supervisory boards in both academic and practitioner venues.