Skip to content
Scan a barcode
Scan
Hardcover Investigating Computer-Related Crime Book

ISBN: 0849319730

ISBN13: 9780849319730

Investigating Computer-Related Crime

Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the field, and new technology to offer a fresh look at the topic of digital investigation.

Following an introduction to cybercrime and its impact on society, this book examines:

Malware and the important differences between targeted attacks and general attacks The framework for conducting a digital investigation, how it is conducted, and some of the key issues that arise over the course of an investigation How the computer forensic process fits into an investigation The concept of system glitches vs. cybercrime and the importance of weeding out incidents that don't need investigating Investigative politics that occur during the course of an investigation, whether to involve law enforcement, and when an investigation should be stopped How to prepare for cybercrime before it happens End-to-end digital investigation Evidence collection, preservation, management, and effective use How to critique your investigation and maximize lessons learned

This edition reflects a heightened focus on cyber stalking and cybercrime scene assessment, updates the tools used by digital forensic examiners, and places increased emphases on following the cyber trail and the concept of end-to-end digital investigation. Discussion questions at the end of each chapter are designed to stimulate further debate into this fascinating field.

 

Recommended

Format: Hardcover

Condition: Very Good

$23.09
Save $176.91!
List Price $200.00
Almost Gone, Only 1 Left!
Save to List

Customer Reviews

3 ratings

The Primer for Digital/Information Forensics

Stephenson's book is the starting place for law enforcement and technical people who wish to move into the digital/information forensics field. The book is an easy read and leads you in proper case handling and the basics of forensic investigations. When I began investigating cyber-crime in the private sector, this was my starting point.

A qualified endorsement

Stephenson's book does an excellent job of covering the technical details of an investigation without becoming impenetrable. The presentation follows a logical sequence. In sum, I am very impressed with the work.Potential readers should be aware that the text is written from the perspective of a corporate investigator/consultant. It does an excellent job of explaining the pitfalls of this role. Stephenson provides personal examples of dealing with the decisions made by corporate bureacracy and law enforcement that effect the work of a private security consultant. He is careful to cite the reasons for such decisions in a manner that is respectful of the process used by the decision makers; this really helps novice investigators and students maintain perspective while internalizing the results of the decisions.The book does not cover legal aspects of the investigation beyond basic evidence preservation and suggestions on when to get the lawyers involved. This is entirely expected from a corporate investigator rather than a law enforcement investigator; I respect an expert who knows when his expertise ends.That being said, take the initial sweeping comments on hackers with a grain of salt. They detract from an otherwise solid book.The greatest strength of the book is the frequent reminder that real-world investigation can be superior to the technical investigation and how the two aid each other.This book would provide an excellent bridge between an advanced investigations text (interviewing, deception detection, standard investigation, etc.) and one of the more technical computer crime forensics books.It is not a bench manual nor an investigations cookbook. Nor is it a completely non-technical writer's understanding of a computer investigation.

investigating computer related crimes

not bad explanations for investigators
Copyright © 2026 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured