||Opamp Technical Books
1033 N. Sycamore Ave.
Los Angeles, CA 90038
1 - 800 - 468 - 4322
- DISCOUNTS APPLY TO SHIPPED ORDERS ONLY!
- Price and Availability subject to change.
- We confirm your order status by e-mail.
|Contents Text: ||Introduction Computer Search Warrant Team Case Supervisor Interview Team Sketch and Photo Team Physical Search Team Security and Arrest Team Technical Evidence Seizure and Logging Team Computer-Related Evidence Types of Computer-Related Evidence Where Computer-Related Evidence May be Found Finding Computer Evidence Examine the Evidence for Criminal Content Cautions and Considerations Legal Requirements Storage of Seized Evidence Investigative Tool Box Software Hardware Other Useful Stuff Crime Scene Investigation Evaluate the Scene in Advance Set Up Search Teams Establish a Plan of Attack Prepare the Search Warrant Execute the Warrant Secure the Scene Teams Perform their Functions Completing the Search Making a Boot Disk What is a Boot Disk? The POST Test The Boot Process What if there is a CMOS Boot Password? So, How Do I Make One? What Problems Might I Encounter? Simple Overview of Seizing a Computer Evidence Evaluation and Analysis Forms of Evidence Analysis Tools Analysis Procedures using PROFILE.BAT Other Analysis Procedures Chronological Search Form Investigating Floppies Common File Extensions Passwords and Encryption What is a Password? What is Encryption? What is the Difference Between Passwords and Encryption? What are Common Uses of Passwords? Where Do You Get a Password? How Do You Break or Bypass a Password or Encryption? How Do You Break or Bypass Encryption? PGP What is a Common Use of Encryption? Sources of Programs and Information Investigating Bulletin Boards Where Do I Start? Initiating the Investigation Tips to Avoid Traps, Snares, and Pitfalls "Elite" Acronyms Networks Network Ups and Downs Network Parts and Pieces Types of Networks Physical Connections Operating Systems So What Does this All Mean? The Bottom Line Ideal Investigative Computer Systems Desktop Portable Tools Computer Chart Media Cables Bags Software Court Procedures Expert Witnesses Pretrial Preparation Speaking to the Judge and Jury Terminology to Use in Court Resumes Equipment Search Warrants Case Law Writing a Warrant Hacker Case Prodigy Service Warrant Credit Card Warrant Search Warrant Samples Conclusion Glossary Index|
|Title: ||Investigating Computer Crime|
|Author: ||Clark; Franklin|
|Price: ||List: 125.95 YOUR PRICE: 119.65|
|Publisher: ||CRC - TAYLOR & FRANCIS|
|# of Pages: ||256|
OPAMP Technical Books
1033 N. Sycamore Avenue
Los Angeles, California 90038 USA
800-468-4322 / 323-464-4322 FAX 323-464-0977
Copyright © 1997-2007 Opamp Technical Books, Inc.