LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ub… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.
Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime.
Specialist LEA practitioners, investigators of cyber-crime, students of cyber-crime courses, and researchers of information technology, criminology, security, and cyber-based law
Chapter 1: Cyberspace: The new frontier for policing?
Chapter 2: Definitions of Cyber Terrorism
Chapter 3: New and emerging threats of cyber crime and terrorism
Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes
Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigations
Chapter 6: High-tech investigations of cyber crime
Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines
Chapter 8: Digital forensics education, training and awareness
Chapter 9: Understanding the situational awareness in cybercrimes: case studies
Chapter 10: Terrorist use of the internet
Chapter 11: ICT as a protection tool against child exploitation
Chapter 12: Cybercrime classification and characteristics
Chapter 13: Cyber terrorism: Case studies
Chapter 14: Social media and Big Data
Chapter 15: Social media and its role for LEAs: Review and applications
Chapter 16: The rise of cyber liability insurance
Chapter 17: Responding to cyber crime and cyber terrorism—botnets an insidious threat
Chapter 18: Evolution of TETRA through the integration with a number of communication platforms to support public protection and disaster relief (PPDR)
BA
AS
FB