Description |
1 online resource (1 volume) : illustrations |
Contents |
Front Cover; Cybercrime Investigation Case Studies; Copyright Page; Contents; 1 Case Studies; 1.1 Introduction; 1.2 A Day in the Life of a Cybercriminal; 1.2.1 Backdating Documents; 1.2.2 False Names and Disposable E-mail Accounts; 1.2.3 Evidence Leads to More Evidence; 1.2.4 Searching for All the Bad Things; 1.2.5 Scenario-Threatening Blog Posts; 1.2.6 Making the Wrong Kind of Friends Online; 1.2.7 A Break in the Case, Otherwise Known as a Suspect's Mistake; 1.2.8 Altered Evidence and Spoliation; 1.2.9 Spoofed Call Harassment; 1.2.10 Disgruntled Employee Steals and Deletes Employer's Data |
|
1.2.11 Missing Evidence1.2.12 Bomb Threats by E-mail; 1.2.13 ID the Suspect; 1.2.14 Online Extortion; 1.2.15 Placing Suspect at a Location; 1.2.16 Placing the Suspect in the Office at a Specific Location; 1.2.17 Stolen Property; 1.2.18 IP Addresses Aren't Enough; 1.2.19 Planted Evidence; 1.3 The Life and Casework of a Cyber Investigator; 1.3.1 Technical Knowledge and Skills; 1.3.2 This Case is Different from That Case; 1.4 Testifying to Your Work; 1.5 Summary; Bibliography |
Summary |
Cybercrime Investigation Case Studies is a ""first look"" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find |
Bibliography |
Includes bibliographical references |
Notes |
Online resource; title from PDF title page (Safari, viewed May 1, 2013) |
Subject |
Computer crimes -- Investigation -- Case studies
|
|
Forensic sciences -- Data processing -- Case studies
|
|
Criminal investigation -- Case studies
|
|
Computer crimes -- Investigation
|
|
Criminal investigation
|
|
Forensic sciences -- Data processing
|
Genre/Form |
Case studies
|
Form |
Electronic book
|
Author |
Shavers, Brett.
Placing the suspect behind the keyboard
|
ISBN |
9780124095359 |
|
0124095356 |
|
0124095054 |
|
9780124095052 |
|