|
|
|
|
LEADER |
03156nmm a2200445 u 4500 |
001 |
EB001916097 |
003 |
EBX01000000000000001078999 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9780124095359
|
020 |
|
|
|a 0124095054
|
020 |
|
|
|a 0124095356
|
050 |
|
4 |
|a HV8079.C65
|
100 |
1 |
|
|a Shavers, Brett
|
245 |
0 |
0 |
|a Cybercrime investigation case studies
|b an excerpt from Placing the suspect behind the keyboard
|c Brett Shavers
|
260 |
|
|
|a Oxford, UK
|b Syngress
|c 2013
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a 1.2.11 Missing Evidence1.2.12 Bomb Threats by E-mail; 1.2.13 ID the Suspect; 1.2.14 Online Extortion; 1.2.15 Placing Suspect at a Location; 1.2.16 Placing the Suspect in the Office at a Specific Location; 1.2.17 Stolen Property; 1.2.18 IP Addresses Aren't Enough; 1.2.19 Planted Evidence; 1.3 The Life and Casework of a Cyber Investigator; 1.3.1 Technical Knowledge and Skills; 1.3.2 This Case is Different from That Case; 1.4 Testifying to Your Work; 1.5 Summary; Bibliography
|
505 |
0 |
|
|a Front Cover; Cybercrime Investigation Case Studies; Copyright Page; Contents; 1 Case Studies; 1.1 Introduction; 1.2 A Day in the Life of a Cybercriminal; 1.2.1 Backdating Documents; 1.2.2 False Names and Disposable E-mail Accounts; 1.2.3 Evidence Leads to More Evidence; 1.2.4 Searching for All the Bad Things; 1.2.5 Scenario-Threatening Blog Posts; 1.2.6 Making the Wrong Kind of Friends Online; 1.2.7 A Break in the Case, Otherwise Known as a Suspect's Mistake; 1.2.8 Altered Evidence and Spoliation; 1.2.9 Spoofed Call Harassment; 1.2.10 Disgruntled Employee Steals and Deletes Employer's Data
|
505 |
0 |
|
|a Includes bibliographical references
|
653 |
|
|
|a Criminal investigation / Case studies
|
653 |
|
|
|a Computer crimes / Investigation / Case studies
|
653 |
|
|
|a Forensic sciences / Data processing / Case studies
|
653 |
|
|
|a Computer crimes / Investigation / fast
|
653 |
|
|
|a Forensic sciences / Data processing / fast
|
653 |
|
|
|a Criminalité informatique / Enquêtes / Études de cas
|
653 |
|
|
|a Enquêtes criminelles / Études de cas
|
653 |
|
|
|a Criminalistique / Informatique / Études de cas
|
653 |
|
|
|a Criminal investigation / fast
|
700 |
1 |
|
|a Shavers, Brett
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 9780124095052
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124095052/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 364.1
|
082 |
0 |
|
|a 005
|
082 |
0 |
|
|a 001.4
|
520 |
|
|
|a Cybercrime Investigation Case Studies is a ""first look"" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find
|