Digital evidence and computer crime forensic science, computers and the internet

Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. Th...

Descripción completa

Detalles Bibliográficos
Autor principal: Casey, Eoghan (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Academic Press c2011.
Edición:3rd ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628258306719
Tabla de Contenidos:
  • Front Cover; Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet; Copyright; Table of Contents; Acknowledgments; Author Biographies; Introduction; Part 1. Digital Forensics; Chapter 1. Foundations of Digital Forensics; 1.1 Digital Evidence; 1.2 Increasing Awareness of Digital Evidence; 1.3 Digital Forensics: Past, Present, and Future; 1.4 Principles of Digital Forensics; 1.5 Challenging Aspects of Digital Evidence; 1.6 Following the Cybertrail; 1.7 Digital Forensics Research; 1.8 Summary; References; Chapter 2. Language of Computer Crime Investigation
  • 2.1 Language of Computer Crime Investigation2.2 The Role of Computers in Crime; 2.3 Summary; References; Chapter 3. Digital Evidence in the Courtroom; 3.1 Duty of Experts; 3.2 Admissibility; 3.3 Levels of Certainty in Digital Forensics; 3.4 Direct versus Circumstantial Evidence; 3.5 Scientific Evidence; 3.6 Presenting Digital Evidence; 3.7 Summary; References; Chapter 4. Cybercrime Law: A United States Perspective; 4.1 Federal Cybercrime Law; 4.2 State Cybercrime Law; 4.3 Constitutional Law; 4.4 Fourth Amendment; 4.5 Fifth Amendment and Encryption; References
  • Chapter 5. Cybercrime Law: A European Perspective5.1 The European and National Legal Frameworks; 5.2 Progression of Cybercrime Legislation in Europe; 5.3 Specific Cybercrime Offenses; 5.4 Computer-Integrity Crimes; 5.5 Computer-Assisted Crimes; 5.6 Content-Related Cybercrimes; 5.7 Other Offenses; 5.8 Jurisdiction; 5.9 Summary; References; Part 2. Digital Investigations; Chapter 6. Conducting Digital Investigations; 6.1 Digital Investigation Process Models; 6.2 Scaffolding for Digital Investigations; 6.3 Applying the Scientific Method in Digital Investigations
  • 6.4 Investigative Scenario: Security Breach6.5 Summary; References; Chapter 7. Handling a Digital Crime Scene; 7.1 Published Guidelines for Handling Digital Crime Scenes; 7.2 Fundamental Principles; 7.3 Authorization; 7.4 Preparing to Handle Digital Crime Scenes; 7.5 Surveying the Digital Crime Scene; 7.6 Preserving the Digital Crime Scene; 7.7 Summary; References; Chapter 8. Investigative Reconstruction with Digital Evidence; 8.1 Equivocal Forensic Analysis; 8.2 Victimology; 8.3 Crime Scene Characteristics; 8.4 Threshold Assessments; 8.5 Summary; References
  • Chapter 9. Modus Operandi, Motive, and Technology9.1 Axes to Pathological Criminals and Other Unintended Consequences; 9.2 Modus Operandi; 9.3 Technology and Modus Operandi; 9.4 Motive and Technology; 9.5 Current Technologies; 9.6 Summary; References; Part 3. Apprehending Offenders; Chapter 10. Violent Crime and Digital Evidence; 10.1 The Role of Computers in Violent Crime; 10.2 Processing The Digital Crime Scene; 10.3 Investigative Reconstruction; 10.4 Conclusions; References; Chapter 11. Digital Evidence as Alibi; 11.1 Investigating an Alibi; 11.2 Time as Alibi; 11.3 Location as Alibi
  • 11.4 Summary