Cybercrime investigation case studies an excerpt from Placing the suspect behind the keyboard

Cybercrime Investigation Case Studies is a ""first look"" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cas...

Full description

Bibliographic Details
Main Author: Shavers, Brett
Format: eBook
Language:English
Published: Oxford, UK Syngress 2013
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03156nmm a2200445 u 4500
001 EB001916097
003 EBX01000000000000001078999
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780124095359 
020 |a 0124095054 
020 |a 0124095356 
050 4 |a HV8079.C65 
100 1 |a Shavers, Brett 
245 0 0 |a Cybercrime investigation case studies  |b an excerpt from Placing the suspect behind the keyboard  |c Brett Shavers 
260 |a Oxford, UK  |b Syngress  |c 2013 
300 |a 1 volume  |b illustrations 
505 0 |a 1.2.11 Missing Evidence1.2.12 Bomb Threats by E-mail; 1.2.13 ID the Suspect; 1.2.14 Online Extortion; 1.2.15 Placing Suspect at a Location; 1.2.16 Placing the Suspect in the Office at a Specific Location; 1.2.17 Stolen Property; 1.2.18 IP Addresses Aren't Enough; 1.2.19 Planted Evidence; 1.3 The Life and Casework of a Cyber Investigator; 1.3.1 Technical Knowledge and Skills; 1.3.2 This Case is Different from That Case; 1.4 Testifying to Your Work; 1.5 Summary; Bibliography 
505 0 |a Front Cover; Cybercrime Investigation Case Studies; Copyright Page; Contents; 1 Case Studies; 1.1 Introduction; 1.2 A Day in the Life of a Cybercriminal; 1.2.1 Backdating Documents; 1.2.2 False Names and Disposable E-mail Accounts; 1.2.3 Evidence Leads to More Evidence; 1.2.4 Searching for All the Bad Things; 1.2.5 Scenario-Threatening Blog Posts; 1.2.6 Making the Wrong Kind of Friends Online; 1.2.7 A Break in the Case, Otherwise Known as a Suspect's Mistake; 1.2.8 Altered Evidence and Spoliation; 1.2.9 Spoofed Call Harassment; 1.2.10 Disgruntled Employee Steals and Deletes Employer's Data 
505 0 |a Includes bibliographical references 
653 |a Criminal investigation / Case studies 
653 |a Computer crimes / Investigation / Case studies 
653 |a Forensic sciences / Data processing / Case studies 
653 |a Computer crimes / Investigation / fast 
653 |a Forensic sciences / Data processing / fast 
653 |a Criminalité informatique / Enquêtes / Études de cas 
653 |a Enquêtes criminelles / Études de cas 
653 |a Criminalistique / Informatique / Études de cas 
653 |a Criminal investigation / fast 
700 1 |a Shavers, Brett 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9780124095052 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124095052/?ar  |x Verlag  |3 Volltext 
082 0 |a 500 
082 0 |a 364.1 
082 0 |a 005 
082 0 |a 001.4 
520 |a Cybercrime Investigation Case Studies is a ""first look"" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find