e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Basic C - Computer & Internet Crime (Books)

  1-20 of 100 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

click price to see details     click image to enlarge     click link to go to the store

$29.95
1. 2003 Guide to Computer and Internet
$39.93
2. Digital Evidence and Computer
$15.21
3. The Seventh Level (Volume 0)
$55.96
4. Digital Evidence and Computer
 
5. Digital Evidence &Computer
 
$5.95
6. Digital Evidence and Computer
$29.95
7. 21st Century Guide to the U.S.
 
8. Digital Evidence & Computer
$53.00
9. Crimes of the Internet
$65.00
10. Risk Factors in Computer-Crime
$26.49
11. Handbook of Computer Crime Investigation:
$23.79
12. Does the Internet Increase Crime?
$68.35
13. Kerr's Computer Crime Law: (American
$149.00
14. Computer Crime Law, 2d (American
$5.00
15. How Personal & Internet Security
$134.87
16. Internet Crimes, Torts and Scams:
$13.95
17. No Child Is Safe: From Internet
$13.55
18. Cyber Crime Fighters: Tales from
$11.52
19. Taking Action Against Internet
$6.78
20. A Smart Kid's Guide to Internet

1. 2003 Guide to Computer and Internet Crimes and Cybercrime: Hacking, Intellectual Property Crimes, Policy, Cases, Guidance, Laws, Documents, Web Crimes, Targets (Core Federal Information Series CD-ROM)
by U.S. Government
CD-ROM: 8841 Pages (2003-04-30)
list price: US$29.95 -- used & new: US$29.95
(price subject to change: see help)
Asin: 1592482139
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This comprehensive CD-ROM provides extensive coverage of the work of the Justice Department on computer crime and intellectual property crimes and the National Infrastructure Protection Center (NIPC), which serves as a national critical infrastructure threat assessment, warning, vulnerability, and law enforcement investigation and response entity, providing timely warnings of international threats, comprehensive analysis and law enforcement investigation and response. Topics covered include:

The new and revised Electronic Search and Seizure Manual (Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, July 2002) NIPC - Information Sharing, Legal Issues, Warnings, Publications, Major Investigations, Incident Reports. Legal Issues of Electronic Commerce Encryption and Computer Crime Federal Code Related to Cybercrime Intellectual Property Crime International Aspects of Computer Crime Privacy issues in the High-Tech Context Prosecuting Crimes Facilitated by Computers and the Internet Protecting Critical Infrastructures Cyberethics and Cyberethics for Kids

Nearly 9,000 pages are reproduced using Adobe Acrobat PDF software - allowing direct viewing on Windows and Apple Macintosh systems. Reader software is included. Our CD-ROMs are privately-compiled collections of official public domain U.S. government files and documents - they are not produced by the federal government. They are designed to provide a convenient user-friendly reference work utilizing the benefits of the Adobe Acrobat format to uniformly present thousands of pages that can be rapidly reviewed, searched by finding specific words, or printed without untold hours of tedious research and downloading. Vast archives of important public domain government information that might otherwise remain inaccessible are available for instant review no matter where you are. This book-on-a-disc makes a great reference work and educational tool. There is no other reference that is as fast, convenient, comprehensive, thoroughly researched, and portable - everything you need to know, from the federal sources you trust. ... Read more

Customer Reviews (1)

5-0 out of 5 stars I am an aspiring computer forensics tech and fraud examiner
I received this item On October,5th much sooner than expected. I haven't browsed the cd yet. I hope it is good. It was 30 bucks. You have made this aspiring computer forensics tech/fraud examiner's day/year! Thanks, and perhaps you could compile some more information cd-rom products for sale. Thanks very much! ... Read more


2. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet
by Eoghan Casey BSMA
Hardcover: 280 Pages (2000-03-06)
list price: US$74.95 -- used & new: US$39.93
(price subject to change: see help)
Asin: 012162885X
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.

Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked,
collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime.

This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.

The accompanying CD-ROM contains simulated cases that integrate many of the topics covered in the text, teaching individuals about:
* Includes CD-ROM multimedia appendix containing simulated cases
* Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence
* Offers readers information about relevant legal issues
* Features coverage of the abuse of computer networks and privacy and security issues on computer networks ... Read more

Customer Reviews (14)

4-0 out of 5 stars Digital Evidence Book
The book arrived within the specified time and was found to be in excellent condition.

4-0 out of 5 stars Great for Lawyer and Police
If you are a lawyer or a police detective with some IT background it is one of the greatest book you can find to improve significantly your skills on evidence searching in the modern world where computers are part of day life of most, including law offenders and their victims.

Be aware this is not a text on "computer crime". Eventually it will include something on this subject, but its focus is "general" crime evidence searching.

On the other hand, if you have strong IT background you will find this book something like a tutorial and missing lots of "more advanced" possibilities, but can be useful for some initial hints to some techniques to be developed in other place.

4-0 out of 5 stars Forensic computing from a law enforcement perspective
This is a textbook that deals with forensic computing from a law enforcement perspective.Divided into five distinct parts, it provides a thorough overview of computer crime laws, forensic methodology, and the process of investigating computer crime.

Fundamental procedures such as obtaining warrants prior to search and seizure, maintaining chain of custody, preserving and documenting the evidence, using multiple sources of corroborating evidence to establish important facts, and testifying in court are introduced in part one.

The next two parts cover the technical aspects of investigating criminal activity involving standalone computer systems and computer networks, respectively.These chapters discuss the technology at a fairly basic level and can be safely skimmed or skipped by readers familiar with the material from other forensic books, which tend to cover it in greater detail.

Part four is perhaps the most interesting in the book.Here the aforementioned techniques are applied to investigations of real-world crimes involving computer intrusions, Internet sex offenders, copyright infringement and online harassment.Elements of criminology are effectively combined with forensic computing methods to guide the investigators along in their quest to uncover the truth.

Guidelines for the handling of the digital crime scene and examination of digital evidence are detailed in part five.

The book is written at an introductory level.The content is technically accurate and the writing clear.References and citations are provided for most claims and statistics, and many examples drawn from real cases amplify the somewhat dry technical narrative.This is a fine introductory textbook worth the purchase price.

5-0 out of 5 stars Very complete book.
It describe all aspects about digital crimes using a clear language. It's very good for neubies.

5-0 out of 5 stars Excellent book from a real expert
This is an excellent book from a real expert.

Everyone and their brother are writing books about computer security and digital forensics.

The difference here is that Eoghan Casey knows what he is talking about.

Excellent book! ... Read more


3. The Seventh Level (Volume 0)
by Dirk Hanson
Paperback: 272 Pages (2009-07-14)
list price: US$16.99 -- used & new: US$15.21
(price subject to change: see help)
Asin: 1439243727
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Listed as one of the New York Times "Best Books of the Year" in 1987, when it was first published, The Seventh Level is a techno-thriller in the tradition of "The Andromeda Strain" and "War Games." More timely than ever, The Seventh Level deals with the threat of an electromagnetic pulse, the rise of the NSA as the nation's premier eavesdropping agency, and the willingness of telephone companies and other high-tech firms to hire the hackers they have helped to apprehend. ... Read more


4. Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet
by Eoghan Casey BSMA
Hardcover: 688 Pages (2011-02-15)
list price: US$69.95 -- used & new: US$55.96
(price subject to change: see help)
Asin: 0123742684
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills. The textbook teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. Additionally, this third edition includes updated chapters dedicated to networked Windows, Unix, and Macintosh computers, and Personal Digital Assistants.

Ancillary materials include an Instructor's Manual and PowerPoint slides.


 



* Provides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence
* Features coverage of the abuse of computer networks and privacy and security issues on computer networks ... Read more

5. Digital Evidence &Computer Crime, Forensic Science Computers &the Internet - 2nd edition
by oghan Casy
 Hardcover: Pages (2004)

Asin: B003JG9ZXU
Canada | United Kingdom | Germany | France | Japan

6. Digital Evidence and Computer Crime: Forensic Science. Computers, and the Internet.(Review): An article from: Security Management
by Ben Rothke
 Digital: 2 Pages (2001-07-01)
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B0008I9APA
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from Security Management, published by American Society for Industrial Security on July 1, 2001. The length of the article is 336 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Digital Evidence and Computer Crime: Forensic Science. Computers, and the Internet.(Review)
Author: Ben Rothke
Publication: Security Management (Refereed)
Date: July 1, 2001
Publisher: American Society for Industrial Security
Volume: 45Issue: 7Page: 142

Article Type: Book Review

Distributed by Thomson Gale ... Read more


7. 21st Century Guide to the U.S. Attorneys ¿ Executive Office for U.S. Attorneys under U.S. Attorney General John Ashcroft ¿ Opinions, Policy Statements, Staff Manuals, U.S. Attorneys¿ Manual, Bulletins on Civil Issues, Terrorism, Fraud, Internet Fraud, Cybercrime, Computer Crime, Criminal Resource Manuals, Report on Los Alamos (Core Federal Information Series)
by U.S. Government
CD-ROM: 37609 Pages (2003-06)
list price: US$29.95 -- used & new: US$29.95
(price subject to change: see help)
Asin: 1592482392
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This comprehensive CD-ROM provides a thorough review of the work of the United States Attorneys, which serve as the nation's principal litigators under the direction of the Attorney General. There are 93 United States Attorneys stationed throughout the United States, Puerto Rico, the Virgin Islands, Guam, and the Northern Mariana Islands. Each U.S. Attorney is the chief federal law enforcement officer of the U.S. within the particular jurisdictions. U.S. Attorneys conduct most of the trial work in which the United States is a party. The U.S. Attorneys have three statutory responsibilities: the prosecution of criminal cases brought by the Federal government; the prosecution and defense of civil cases in which the United States is a part; the collection of debts owed the Federal government which are administratively uncollectable.

Coverage includes: U.S. Attorneys Opinions, Policy Statements and Staff Manuals documents reproduced include: United States Attorneys' Manual; Bellows Report: Final Report of the Attorney General's Review Team on Handling of Los Alamos National Laboratory Investigation; 1996 through 2002 United States Attorneys' Bulletins (2002: Civil Issues; Anti-Terrorism; Fraud in the Corporate Context; Project Safe Neighborhoods); (2001: High Tech; Investment Fraud; Forensic Evidence; IRS Reorganization and Tax Prosecution; Internet Fraud; Cybercrime II; Computer Crimes and Intellectual Property; Community Prosecution); (2000: ADR Issues; Jury Issues; Trial Advocacy; Environment); (1999: Enforcement Issues; Bankruptcy Fraud; Money Laundering; Cumulative Index; Victims' Rights); (1998: Trial and Appellate Matters; Dedicated to the Memory of F. Page Newton; Tax Prosecutions; Church Arsons and Hate Crimes Issue; Special Commendations Issue); (1997: Electronic Investigative Techniques I and II; Special Commendations Issue; Health Care Fraud Issues I and II; Civil Issues); (1996: International Extradition; International Legal Issues; Trial Techniques: Courtroom Innovation; Trial Techniques: Collecting, Analyzing, and Presenting Evidence; Trial Techniques: Immigration Forum); EOUSA Resource Manual; ENRD Resource Manual; Tax Resource Manual; Civil Rights Resource Manual; Criminal Resource Manual.

Executive Office for United States Attorneys (EOUSA), liaison office between Department of Justice and the 93 US Attorneys; EOUSA Office of Legal Education (OLE).

U.S. Attorneys' Offices coverage includes every district in all 50 states and the territories. Coverage includes: Press Releases and Press Release Archives (often dating back to 2000 or earlier) concerning cases prosecuted; Office information including addresses, contact information, and directions; Office histories; Newsletters; Annual Reports; Outreach; Victim and Witness Information.

In all, the disc has over 37,000 pages reproduced using Adobe Acrobat PDF software - allowing direct viewing on Windows and Apple Macintosh systems. Reader software is included on the CD. There is no other reference that is as fast, convenient, comprehensive, and portable.

Our CD-ROMs are privately-compiled collections of official public domain U.S. government files and documents - they are not produced by the federal government. They are designed to provide a convenient user-friendly reference work, utilizing the benefits of the Acrobat format to uniformly present thousands of pages that can be rapidly reviewed or printed without untold hours of tedious searching and downloading. Vast archives of important public domain government information that might otherwise remain inaccessible are available for instant review no matter where you are. This book-on-a-disc set makes a great reference work and educational tool. ... Read more


8. Digital Evidence & Computer Crime- Forensic Science, Computers, & the Internet 2nd EDITION
by roghan Casry
 Hardcover: Pages (2004)

Asin: B0041W0XVO
Canada | United Kingdom | Germany | France | Japan

9. Crimes of the Internet
by Frank J. Schmalleger, Michael Pittaro
Paperback: 672 Pages (2008-03-08)
list price: US$74.60 -- used & new: US$53.00
(price subject to change: see help)
Asin: 0132318865
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This book contains 31 original scholarly articles on all aspects of cybercrime—from emerging global crimes of the Internet, to criminological perspectives on cybercrime to investigating and prosecuting cybercrimes. Offering a collection of previously unpublished works, this book examines emerging global crimes, challenges faced by law enforcement, and the underlying reasons for the rise in such activities. Through a variety of essays, it explores the role of the cybercriminal, the victim, and the cybercriminal’s impact on the criminal justice system. ... Read more


10. Risk Factors in Computer-Crime Victimization (Criminal Justice: Recent Scholarship)
by Kyung-shick Choi
Library Binding: 186 Pages (2010-08-11)
list price: US$65.00 -- used & new: US$65.00
(price subject to change: see help)
Asin: 1593324014
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of RAT by delineating patterns of computer-crime victimization. ... Read more


11. Handbook of Computer Crime Investigation: Forensic Tools and Technology
Paperback: 448 Pages (2001-11-12)
list price: US$67.95 -- used & new: US$26.49
(price subject to change: see help)
Asin: 0121631036
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.
The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool.

The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.

The Tools section provides details of leading hardware and software
·
The main Technology section provides the technical "how to" information
· for collecting and analysing digital evidence in common situations
Case Examples give readers a sense of the technical, legal, and practical
· challenges that arise in real computer investigations ... Read more

Customer Reviews (8)

5-0 out of 5 stars Hands-on, immediately applicable to our real-world cases
Eoghan Casey's text is immediately useful.It's not theory, it's practical.It's not biased to one operating system, but covers several technologies.Finally, Eoghan and the book's contributors do not gloss over today's most offensive topics, they address them with vigor and solutions.

I would share one concern: the chapter-long product/vendor discussion.Some reviewers label it marketing; other reviewers don't mention it at all.I'll just forewarn you that you will learn much more about EnCase or NFR than about their competitors.

As a security consultant for Hewlett-Packard, it seems my bookshelf fills up entirely too easily, especially as of the last few years.Therefore, I've gotten fairly selective with new book purchases (until I can get a new bookshelf).However, Casey's text is DEFINITELY worth getting - worth knocking another book off to make room.:)

I hope you enjoy this comprehensive text at least half as much as I do.

5-0 out of 5 stars This is an excellent book from a real expert.
This is an excellent book from a real expert.

Everyone and their brother are writing books about computer security and digital forensics.

The difference here is that Eoghan Casey knows what he is talking about.

Excellent book!

5-0 out of 5 stars Excellent for making your own Methodology
The book reviews different tools and techniques for a forensic investigation by experts in the field. Very good reference manual for new and experienced investigators.

5-0 out of 5 stars A step on..
The 'Handbook of Computer Crime Investigation' follows on well from Eoghan Casey's previous title, 'Digital Evidence and Computer Crime' which I found to be a sound introduction to the subject. This latest book is targeted at those already proficient in Computer Forensics and provides in depth detail of techniques essential to any computer related investigation. Also included are sections specific to examining various operating systems. As someone who both works in information security and has a particular interest in computer forensics I can thoroughly recommend this book!

5-0 out of 5 stars Essays by a variety of learned and experienced authors
Capably edited by Eoghan Casey (System Security Administrator, Yale University), Handbook Of Computer Crime Investigation: Forensic Tools And Technology is a fascinating guide to the software and hardware tools necessary for collecting digital evidence of cyber crimes ranging from cyberstalking and child pornography to financial fraud, espionage, or terrorism. Essays by a variety of learned and experienced authors present the latest means of forensic analysis for Windows, Unix, and more systems. Sample code, charts, and appropriate case examples pepper this amazing, cutting-edge criminology reference. Handbook Of Computer Crime Investigation is an invaluable and "user friendly" contribution to the field of computer and Internet security. ... Read more


12. Does the Internet Increase Crime? (At Issue Series)
by Stefan Kiesbye
Hardcover: 112 Pages (2010-06-11)
list price: US$31.80 -- used & new: US$23.79
(price subject to change: see help)
Asin: 0737748788
Canada | United Kingdom | Germany | France | Japan

13. Kerr's Computer Crime Law: (American Casebook Series)
by Orin S. Kerr
Hardcover: 755 Pages (2006-10-04)
list price: US$141.00 -- used & new: US$68.35
(price subject to change: see help)
Asin: 0314144005
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This book introduces the future of criminal law. It covers every aspect of crime in the digital age, assembled together for the first time. Topics range from Internet surveillance law and the Patriot Act to computer hacking laws and the Council of Europe cybercrime convention. More and more crimes involve digital evidence, and computer crime law will be an essential area for tomorrow's criminal law practitioners. Many U.S. Attorney's Offices have started computer crime units, as have many state Attorney General offices, and any student with a background in this emerging area of law will have a leg up on the competition. This is the first law school book dedicated entirely to computer crime law. The materials are authored entirely by Orin Kerr, a new star in the area of criminal law and Internet law who has recently published articles in the Harvard Law Review, Columbia Law Review, NYU Law Review, and Michigan Law Review. The book is filled with ideas for future scholarship, including hundreds of important questions that have never been addressed in the scholarly literature. The book reflects the author's practice experience, as well: Kerr was a computer crime prosecutor at the Justice Department for three years, and the book combines theoretical insights with practical tips for working with actual cases. Students will find it easy and fun to read, and professors will find it an angaging introduction to a new world of scholarly ideas. The book is ideally suited either for a 2-credit seminar or a 3-credit course, and should appeal both to criminal law professors and those interested in cyberlaw or law and technology. No advanced knowledge of computers and the Internet is required or assumed ... Read more


14. Computer Crime Law, 2d (American Casebook)
by Orin S. Kerr
Hardcover: 843 Pages (2009-10-23)
list price: US$155.00 -- used & new: US$149.00
(price subject to change: see help)
Asin: 0314204547
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
The second edition of Kerrs popular computer crimes text reflects the many new caselaw and statutory developments since the publication of the first edition in 2006. It also adds a new section on encryption that covers both Fourth Amendment and Fifth Amendment issues raised by its use to conceal criminal activity. Computer crime law will be an essential area for tomorrow's criminal law practitioners, and this book offers an engaging and user-friendly introduction to the field. It is part traditional casebook, part treatise: It both straightforwardly explains the law and presents many exciting and new questions of law that courts are only now beginning to consider. The book reflects the author's practice experience, as well: Orin Kerr was a computer crime prosecutor at the Justice Department for three years, and the book combines theoretical insights with practical tips for working with actual cases. No advanced knowledge of computers and the Internet is required or assumed This book covers every aspect of crime in the digital age. Topics range from Internet surveillance law and the Fourth Amendment to computer hacking laws and international computer crimes. More and more crimes involve digital evidence, and computer crime law will be an essential area for tomorrow's criminal law practitioners. Many U.S. Attorney's Offices have started computer crime units, as have many state Attorney General offices, and any student with a background in this emerging area of law will have a leg up on the competition. This is the first law school book dedicated entirely to computer crime law. The materials are authored entirely by Orin Kerr, a new star in the area of criminal law and Internet law who has recently published articles in the Harvard Law Review, Columbia Law Review, NYU Law Review, and Michigan Law Review. The book is filled with ideas for future scholarship, including hundreds of important questions that have never been addressed in the scholarly literature. The book reflects the author's practice experience, as well: Kerr was a computer crime prosecutor at the Justice Department for three years, and the book combines theoretical insights with practical tips for working with actual cases. Students will find it easy and fun to read, and professors will find it an angaging introduction to a new world of scholarly ideas. The book is ideally suited either for a 2-credit seminar or a 3-credit course, and should appeal both to criminal law professors and those interested in cyberlaw or law and technology. No advanced knowledge of computers and the Internet is required or assumed. ... Read more


15. How Personal & Internet Security Works
by Preston Gralla
Paperback: 288 Pages (2006-06-10)
list price: US$34.99 -- used & new: US$5.00
(price subject to change: see help)
Asin: 0789735539
Average Customer Review: 2.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!

 

How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.

 

... Read more

Customer Reviews (1)

2-0 out of 5 stars The big disappointment
I purchased this book online without getting a chance to look inside (the option was not available for this title...I believe I know why). In many cases buying a book by its title works out, but in this case it did not. Had I realized that this "award winning author of more than 30 books" also wrote a book called "Complete Idiot's Guide to Internet Privacy and Security", I certainly would have passed on the purchase.

For a book of 280 pages, it contains very very little real content. Each chapter begins with a one page description of the topic (probably the most useful part of the book), followed by a series of two page spreads on each subtopic. Each two page spread is completely covered by a computer generated graphic, and 4 - 8 small paragraphs, enough to fill up at most 1/2 of one of the two pages. The graphics usually attempt to depict the subtopic, but most of the time there are a few items in the graphic that relate to the topic, but the graphics alone add no value to the topics, and often are a distraction from the few small paragraphs on the two pages. Had the graphics been absent, and the text condensed into normally spaced pages, no content or meaning would have been lost, and this would have amounted to about a 70 page book full of commonly known buzzwords and surface information many already know.

As an example of how Gralla treats each subtopic, consider this analogy. If I were to read a book on how an automobile engines work, I would expect it to say something about the carburator, spark plugs, timing, camshaft, crankshaft, pistons, etc. The "Gralla" equivalent of this description would be something like "The gas goes in the engine, the spark plugs fire, and the wheels go round". For some, maybe that is enough. But for me, a book called "How Works" should tell you how it works!

So, if all you need is the "gas, sparkplug, wheels" version of how things work in the internet security world, and you have $20 or so dollars to throw at it, then this is the book for you. However, if you would like to dig a little deeper, save your $20.00 and look for a more technical book on the subject, as I am off to do. What a big disappointment, and a waste of $20. ... Read more


16. Internet Crimes, Torts and Scams: Investigation and Remedies
by Melise Blakeslee
Paperback: 472 Pages (2010-01-15)
list price: US$185.00 -- used & new: US$134.87
(price subject to change: see help)
Asin: 0195373510
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Internet Crimes, Torts and Scams: Investigation and Remedies helps attorneys understand the increasing range of illegal and malicious internet activity and a similarly expanding number of response or enforcement options. Reflecting a "real-world" dynamic, the book is problem-oriented and cuts across many practice areas including intellectual property enforcement, libel, third-party liability, forensics, and global jurisdictional issues. It will aid practitioners who need to identify not only the type of problem a client faces but how to investigate and best respond to protect a client's interests in any given situation.

In Internet Crimes, Torts and Scams, Melise Blakeslee draws upon her extensive experience investigating and litigating internet-based legal problems to produce a unique and accessible book for any attorney advising a client on internet-related risks. Topics covered in this comprehensive text include: investigation techniques such as how to interpret email headers, global jurisdiction, investigation of counterfeiters, intellectual property, the problems of anonymity on the Internet, and preparation of complaints. Also included are extensive appendices, including ICANN complaints, motions, a list of online resources, and guidelines for the seizure of electronic evidence. ... Read more

Customer Reviews (1)

5-0 out of 5 stars Excellent book
This is an excellent book for any legal professional looking to learn about crimes perpetrated on the Internet and ways to investigate and resolve client issues.The book covers basic investigation techniques, jurisdictional issues, intellectual property, freedom of expression, electronic evidence, and forensics and experts.The concepts in the book are explained clearly and thoroughly and each chapter has numerous practice tips and real world examples. If you are looking to learn about Internet crimes and gain practical knowledge on how to effectively protect your client online, this book is a must have reference tool.
... Read more


17. No Child Is Safe: From Internet Crime
by Amber Frangos
Paperback: 180 Pages (2005-07-11)
list price: US$13.95 -- used & new: US$13.95
(price subject to change: see help)
Asin: 0971908311
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
No Child Is Safe: from Internet Crime, A Guide for Parents is filled with the common sense, easy to follow tips a parent must use to keep their children safe on the Internet. Easy to read, No Child Is Safe is geared toward parent's with very little computer knowledge. This is not a technical manual nor is it filled with crime solving techniques. Amber Frangos walks the parent through the mechanics of the Internet in such a way any parent can become Internet savvy. ... Read more


18. Cyber Crime Fighters: Tales from the Trenches
by Felicia Donovan, Kristyn Bernier
Paperback: 336 Pages (2008-12-14)
list price: US$21.99 -- used & new: US$13.55
(price subject to change: see help)
Asin: 0789739224
Average Customer Review: 3.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

Cyber Crime Fighters: Tales from the Trenches offers one of the most insightful views of the latest criminal threats to the public: cyber crime. This book provides a good primer on how your personal information can be easily obtained by some of the folks you least want to have it.”

–Maureen Boyle, crime reporter,

The Enterprise of Brockton, MA

 

“Experts Felicia Donovan and Kristyn Bernier pull no punches in explaining the dangers lurking on the Web, from identity appropriation and theft to using new technology and the Internet to facilitate real-life stalking. Parents especially will be shocked at how easy it is for predators to target and solicit children online.

 

“By clearly explaining the dangers that lurk online and highlighting practical tips to minimize your risk, the authors have created a book that not only educates but empowers readers to protect themselves.”

–Jennifer Hemmingsen, columnist and former public safety reporter,

The (Cedar Rapids, Iowa) Gazette

 

Written by leading cyber crime investigators, Cyber Crime Fighters: Tales from the Trenches takes you behind the scenes to reveal the truth behind Internet crime, telling shocking stories that aren’t covered by the media, and showing you exactly how to protect yourself and your children. This is the Internet crime wave as it really looks to law enforcement insiders: the truth about crime on social networks and YouTube, cyber stalking and criminal cyber bullying, online child predators, identity theft, even the latest cell phone crimes. Here are actual cases and actual criminals, presented by investigators who have been recognized by the FBI and the N.H. Department of Justice. These stories are true—and if you want to stay safe, you need to know about them.

 

     •    Learn how today’s criminals can track your whereabouts, read your emails, and steal your identity

     •    Find out how much of your personal information is already online—and how to keep the rest private

     •    Learn how cyber stalkers really think—and how to protect yourself  from them

     •    Protect your laptop, your iPod, and your precious data from getting stolen

     •    Encounter the “dark side” of Internet dating

     •    Discover the hidden crime wave on today’s specialized social networks

     •    Uncover the cell phone “upskirters” and “downblousers” —and the technicalities that keep them out of jail

     •    Follow cyber crime specialists as they investigate and catch online sexual predators

     •    Get the real truth about phishing, pharming, criminal spam, and online scams

     •    See how investigations really work—and why TV crime shows often get it wrong!

     •    Walk through your own personal, step-by-step, online safety checkup

... Read more

Customer Reviews (7)

2-0 out of 5 stars Highly disappointing
As a security professional, I was greatly looking forward to some in depth stories of cyber crime, but was highly disappointed by the content of the book.There was no feeling that the authors had any first hand experience actually working with cyber crime - in fact, most of the information was simple recaps of online events that could be found on MSNBC or CNN - no additional details or insights, and certainly no first hand knowledge.

The book is egregiously self-righteous, emitting words of wisdom like, "Flirting online can have serious consequences."Wow.Really?

To be fair, I think the book would be a good read for NON-security professionals and parents, who would likely find the information useful and entertaining (and likely somewhat frightening).For someone who is truly studying internet defense and online security, I strongly feel the book is a waste of time and money.

3-0 out of 5 stars Not what you think it is
I purchased this book because I am doing research on cyber crime to try to define a model that would help estimate the size of the "cyber crime industry".Anyone having spent any reasonable amount of time on this topic knows that current estimates range from an unjustifiable $100 million to an unjustifiable $1 trillion (I used to take Finjan seriously).Please understand that my level of awareness in the cyber crime space is relatively high.

By the title, I expected this book to focus on the activities of organized cyber crime and how law enforcement deals with it.However, upon reading, I quickly realized that there is a fundamental difference in the logic of the discussion of the book and the title of the book, at least I far as I would like to address it.

The overall tone of the book seems to be the use of technology by "deviant" men to abuse women and children.While I concur that 100% of the cases cited in the book are repulsive and the perpetrators should be castrated, I must say that I found the argument to be a bit more emotional than technical, which, by the title, is what I was expecting.

Notwithstanding the generally well-documented case studies, I detect a tinge of "revenge" in the writing, as if the authors had themselves been victims of some unfortunate on-line mishchief a bit closer to the heart than what they share in the book.

That said, please do not misunderstand me.This book is a well-written documentary of many people that have been criminally assaulted by delinquents that have leveraged technology to execute their crimes. Let there be no mistake: the crimes and criminals are real.However, I do not think "cyber crime" is the appropriate label for every instance in which someone uses technology to committ a crime.

"Cyber crime" is a term that should be used for crimes committed on-line. If I use a search engine to find your address and then I rob your house, this is not a cyber crime.This book considers this a cyber crime, and 90% of the book focuses on this tpye of "cyber" crime...crime that uses "cyber" technology as an enabler.

After this criticism that could be considered harsh, let me point out the srtrong points of this book.It is a clear, rationale account of how deviant people use technology to advance their malicious activities.There are some seriously delusional people that are unfortunately savvy in a techological sense. Advanced technology helps these people make their nastiness more efficient. The cases discussed are serious, many of the outcomes are tragic, and the people writing them are clearly passionate about reducing the risk of the potential victims of the crimes disucssed. For this I commend their effort, and I hope that they are very successful.

I highly recommend this book to anyone who is being abused on-line, and I believe that the authors would intervene at a personal level to help you.I do not, however, recommend this book to anyone looking for a reference body for law enforcement acitivities in cyber crime.

Assuming the authors find my point of view misaligned, I would very much like to continue this discussion off-line. I personally guarantee that I will follow-up on any response given to my evaluation of this book. I publish and take responsibility for my reviews under my own name.

4-0 out of 5 stars Cyber Crime Fighters
I think that the majority of us think that with good virus protection and a spam filter that we are safe from cyber crime. For the most part, we all feel pretty safe. Not only is this untrue but what we don't know can harm us.

Cyber Crime Fighters looks at the reality of cyber crime. This includes stories and advice about everything from identity theft, the dark side of Internet dating, worries about online child predators, and even cyber stalking. Perhaps the most surprising is the rise in videos uploaded to YouTube without the knowledge of the person in the clip and the sheer number of types of gps tracking and keystroke logging mechanisms available. With these devices, we could be victims and not even know a crime has been committed.

These days it's especially important to keep up on these issues. Cyber Crime Fighters tells us what can happen and how we can protect ourselves.

3-0 out of 5 stars More for newbies than techy security folks
The old adage of 'don't trust a book by its cover' comes to mind on this one. As a computer security professional and forensic hobbyist myself, I was thinking this book may provide some in-depth information on crimes and investigative techniques you won't find on the evening news (or SANS newsbites). What I found though, was more appropriate for my 65 year old mother or other computer neophyte that needs some basic information to avoid being victimized.Instead of teaching us how to investigate/solve cyber crime, the core theme was how to avoid it.There were some times where I thought if my Mom did read this book, she would never use the internet. If I were to rename the book, it would be "The Internet is the Wild, Wild West - Here's Some Ammo".The topics were mostly generic in nature and I didn't feel like I was getting any privileged or unique information that I couldn't get from other sources.

So clearly, my expectations were not in line with the book, but I don't want to fault the authors.I realize my disappointment is entirely my fault for mis-interpreting the title. If I had read the "Message from the Authors", I may have been alerted that this is more of an "Internet Safety 101"course.If you are looking for such book, than by all means I recommend this book. If you are a computer security professional however, you may found this to just be a re-fresher with little added value.

5-0 out of 5 stars A Real Contribution
This book is a real contribution to the war against those who would exploit our children. Any parent with concerns about the pitfalls of the Internet will find this book helpful. The authors' backgrounds in law enforcement make this a compelling story, "from the trenches." ... Read more


19. Taking Action Against Internet Crime
by Sarah Levete
Paperback: 48 Pages (2010-01-15)
list price: US$11.75 -- used & new: US$11.52
(price subject to change: see help)
Asin: 1435896696
Canada | United Kingdom | Germany | France | Japan

20. A Smart Kid's Guide to Internet Privacy (Kids Online)
by David J. Jakubiak
Paperback: 24 Pages (2009-09)
list price: US$8.25 -- used & new: US$6.78
(price subject to change: see help)
Asin: 1435833562
Canada | United Kingdom | Germany | France | Japan

  1-20 of 100 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

site stats