Skip to main content Skip to search
HKSYU Library

    Librarian View

    LEADER 06614cam 2200877 i 4500
    001
    991007916023307546
    005
    20251116205443.0
    006
    m o d |
    007
    cr#cn#---uuuuu
    008
    140731t20142014maua ob 001 0 eng d
    020
     
     
    a| 9780128008119
    020
     
     
    a| 0128008113
    035
     
     
    a| (CKB)2550000001331888
    035
     
     
    a| (EBL)1744499
    035
     
     
    a| (OCoLC)884646450
    035
     
     
    a| (SSID)ssj0001398958
    035
     
     
    a| (PQKBManifestationID)11779211
    035
     
     
    a| (PQKBTitleCode)TC0001398958
    035
     
     
    a| (PQKBWorkID)11446756
    035
     
     
    a| (PQKB)10293864
    035
     
     
    a| (Au-PeEL)EBL1744499
    035
     
     
    a| (CaPaEBR)ebr10896655
    035
     
     
    a| (CaONFJC)MIL628984
    035
     
     
    a| (OCoLC)889268705
    035
     
     
    a| (CaSebORM)9780128007433
    035
     
     
    a| (MiAaPQ)EBC1744499
    035
     
     
    a| (OCoLC)426884497
    035
     
     
    a| (OCoLC)887736505
    035
     
     
    a| (OCoLC)ocn887736505
    035
     
     
    a| (EXLCZ)992550000001331888
    040
     
     
    a| MiAaPQ b| eng e| rda e| pn c| MiAaPQ d| MiAaPQ d| StDnUAD
    041
     
     
    a| eng
    050
     
    4
    a| HV8079.C65 b| .A37 2014
    082
    0
    4
    a| 363.25/968 2| 23
    082
     
     
    a| 364.168
    100
    1
     
    a| Akhgar, Babak.
    245
    0
    0
    a| Cyber crime and cyber terrorism investigator's handbook / c| edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers.
    250
     
     
    a| 1st edition
    264
     
    1
    a| Waltham, Massachusetts : b| Syngress, an imprint of Elsevier, c| [2014].
    264
     
    4
    c| ©2014
    300
     
     
    a| 1 online resource (xxiii, 282 pages) : b| illustrations
    336
     
     
    a| text b| txt 2| rdacontent
    337
     
     
    a| computer b| c 2| rdamedia
    338
     
     
    a| online resource b| cr 2| rdacarrier
    347
     
     
    a| text file
    490
    0
     
    a| Special needs offenders closeup
    500
     
     
    a| Description based upon print version of record.
    505
    0
     
    a| Front Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction
    505
    8
     
    a| Some Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References
    505
    8
     
    a| Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture
    505
    8
     
    a| Verification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services
    505
    8
     
    a| Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders
    505
    8
     
    a| Recovering Deleted Partitions
    520
     
     
    a| Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many
    546
     
     
    a| English
    504
     
     
    a| Includes bibliographical references and index.
    588
     
     
    a| Description based on print version record.
    538
     
     
    a| Mode of access: Internet from FJC web site. Address as of 7/14/09: http://www.fjc.gov/public/pdf.nsf/lookup/snocyb02.pdf/$file/snocyb02.pdf; current access available via PURL.
    650
     
    0
    a| Computer crimes x| Investigation.
    650
     
    0
    a| Cyberterrorism x| Investigation.
    650
     
    0
    a| Computer crimes x| Investigation v| Case studies.
    650
     
    0
    a| Cyberterrorism x| Investigation v| Case studies.
    700
    1
     
    a| Akhgar, Babak, e| editor
    700
    1
     
    a| Staniforth, Andrew, e| editor
    700
    1
     
    a| Bosco, Francesca M., e| editor
    700
    1
     
    a| Elliot, Steve, e| editor
    700
    1
     
    a| Rearick, Benjamin, e| project director
    700
    1
     
    a| Kumaraguruparan, Priya, e| project director
    700
    1
     
    a| Rogers, Mark, e| designer
    710
    2
     
    a| Federal Judicial Center.
    776
    0
    8
    z| 9780128007433
    776
    0
    8
    z| 0128007435
    776
    0
    8
    z| 9781306977333
    776
    0
    8
    z| 1306977339
    906
     
     
    a| BOOK
    945
     
     
    h| Supplement l| location i| barcode y| id f| bookplate a| callnoa b| callnob n| PSY352