Updated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence continues to balance technicality and legal analysis as it enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy, and administration.card fraud concerns Jeffrey P. Butcher, who obtained and used a Home Depot credit card that was issued in another name (Dureene Kiplinger) to obtain merchandise.47 Another example concerns Daniel Espinell who used stolen credit cardsanbsp;...
|Author||:||Associate Professor John Jay College of Criminal Justice Marie-Helen Maras, Marie-Helen Maras|
|Publisher||:||Jones & Bartlett Publishers - 2014-02-19|