Hot Best Seller

Scene of the Cybercrime: Computer Forensics Handbook

Availability: Ready to download

This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must n This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must not be contaminated. It provides law enforcement officers with an understanding of the technical aspects of cybercrime and of how technology can be used to help solve crimes that have been committed. Author Biographies: Debra Littlejohn Shinder is a former Police Sergeant and Police Academy Instructor, turned IT professional. She and her husband, Dr. Thomas W. Shinder, have provided network consulting services to businesses and municipalities, conducted training at colleges and technical training centers, and spoken at seminars around the country. Deb specializes in networking and security, and she and Tom have written numerous books, including the best selling Configuring ISA Server 2000 (Syngress Publishing, ISBN: 1-928994-29-6), and Deb is the sole author of Computer Networking Essentials. Deb also is the author of over 100 articles for print publications and electronic magazines such as TechProGuild, CNET, 8Wire, and Cramsession.com. Deb is a member of the editorial board of the Journal of Police Crisis Negotiations and the advisory board of the Eastfield College Criminal Justice Training Center. Ed Tittel (Technical Editor) is a 20-year veteran of the computing industry who's worked as a programmer, systems engineer, technical manager, writer, consultant, and trainer. A contributor to over 100 computer books, Ed created the Exam Cram series of certification guides. Ed also writes for numerous Web sites and magazines on certification topics including InformIT.com, Certification and IT Contractor magazines, and numerous TechTarget venues.


Compare

This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must n This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must not be contaminated. It provides law enforcement officers with an understanding of the technical aspects of cybercrime and of how technology can be used to help solve crimes that have been committed. Author Biographies: Debra Littlejohn Shinder is a former Police Sergeant and Police Academy Instructor, turned IT professional. She and her husband, Dr. Thomas W. Shinder, have provided network consulting services to businesses and municipalities, conducted training at colleges and technical training centers, and spoken at seminars around the country. Deb specializes in networking and security, and she and Tom have written numerous books, including the best selling Configuring ISA Server 2000 (Syngress Publishing, ISBN: 1-928994-29-6), and Deb is the sole author of Computer Networking Essentials. Deb also is the author of over 100 articles for print publications and electronic magazines such as TechProGuild, CNET, 8Wire, and Cramsession.com. Deb is a member of the editorial board of the Journal of Police Crisis Negotiations and the advisory board of the Eastfield College Criminal Justice Training Center. Ed Tittel (Technical Editor) is a 20-year veteran of the computing industry who's worked as a programmer, systems engineer, technical manager, writer, consultant, and trainer. A contributor to over 100 computer books, Ed created the Exam Cram series of certification guides. Ed also writes for numerous Web sites and magazines on certification topics including InformIT.com, Certification and IT Contractor magazines, and numerous TechTarget venues.

36 review for Scene of the Cybercrime: Computer Forensics Handbook

  1. 4 out of 5

    Prattle On, Boyo

    Littlejohn Shinder writes a fairly topical analyses of various facets of cybercrime -including several- what can only be described as Computers 101 sections but if you're a typical n00b then it will all seem like a glorious epiphany. In Ch 4 she gets a little on the didactic side where she attempts to debunk the various stereotypes and cliched mindsets associated with the hacking community but she falls far short of any real insight. Don't bother reading this book if you have even a modicum of te Littlejohn Shinder writes a fairly topical analyses of various facets of cybercrime -including several- what can only be described as Computers 101 sections but if you're a typical n00b then it will all seem like a glorious epiphany. In Ch 4 she gets a little on the didactic side where she attempts to debunk the various stereotypes and cliched mindsets associated with the hacking community but she falls far short of any real insight. Don't bother reading this book if you have even a modicum of tech savvy - the writer won't be telling you anything that you don't already know or figured out for yourself hands on. BTW, most of the URLS provided as reference in this book are 404, which is only to be expected given its 2002 publication date, however I include the comment here in this review because if you're like me, then you like to check out the resources the writer used. Lastly, by no stretch of the imagination should this title be considered a computer forensics book. The only audience that will consider said title as such are executive officers and marketing types who don't have a clue.

  2. 4 out of 5

    RaChelle

  3. 5 out of 5

    Ahmed Gouda

  4. 4 out of 5

    Rui Natário

  5. 4 out of 5

    Dave

  6. 5 out of 5

    Andreu

  7. 5 out of 5

    John

  8. 4 out of 5

    Joseq

  9. 5 out of 5

    Dean

  10. 5 out of 5

    Ibrahim

  11. 4 out of 5

    Sean

    Another text for Grad School. This one was quite entertaining.

  12. 4 out of 5

    Kaiser

  13. 4 out of 5

    Kurt

  14. 5 out of 5

    MangRoisz

  15. 4 out of 5

    Vicky

  16. 4 out of 5

    Sanjay tungar

  17. 4 out of 5

    Subhajit Das

  18. 4 out of 5

    Nazmul Ahmed Noyon

  19. 4 out of 5

    Will Conrad

  20. 5 out of 5

    JW Stanley

  21. 4 out of 5

    Morris.a

  22. 5 out of 5

    Denise

  23. 4 out of 5

    Thomas

  24. 5 out of 5

    Doria Abdullah

  25. 4 out of 5

    Cezar Popescu

  26. 4 out of 5

    Digital Forensics

  27. 4 out of 5

    Teresa Merklin

  28. 5 out of 5

    Juan R.

  29. 4 out of 5

    Job

  30. 4 out of 5

    Christian Meyer

  31. 5 out of 5

    Elisa

  32. 4 out of 5

    Sergio

  33. 4 out of 5

    Chandra Simarmata

  34. 5 out of 5

    Sandy Huskey

  35. 5 out of 5

    MerryMeerkat

  36. 4 out of 5

    Preeti Chakraborty

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.