skip to content
Investigating computer crime : a primer for security managers Preview this item
ClosePreview this item
Checking...

Investigating computer crime : a primer for security managers

Author: Ronald L Mendell
Publisher: Springfield, Ill. : C.C. Thomas, ©1998.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"New advancements being made every day in the field of computer technology have created an equally new and high-tech method of illegal activity - computer crime. To help combat this offense, the author has designed a comprehensive primer to provide a fundamental investigative foundation for readers while moving through the basic phases of a computer crime investigation. The topics discussed cover everything from  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Mendell, Ronald L.
Investigating computer crime.
Springfield, Ill. : C.C. Thomas, ©1998
(OCoLC)761456564
Document Type: Book
All Authors / Contributors: Ronald L Mendell
ISBN: 0398068909 9780398068905 0398068917 9780398068912
OCLC Number: 39202194
Description: xi, 186 pages : illustrations ; 27 cm
Contents: Ch. 1. Solvability Factors --
Ch. 2. Retail Computer Security --
Ch. 3. Evil Whispers and Other Problems --
Ch. 4. Intelligence Gathering --
Ch. 5. The Investigative Process: An Overview --
Ch. 6. Establishing the Corpus Delicti --
Ch. 7. Other Causes for Concern --
Ch. 8. Preserving Evidence --
Ch. 9. Making Sure about the Evidence (Determining the Actual Attack) --
Ch. 10. Determining the Weak Points (Establishing an M.O.) --
Ch. 11. Determining the Responsible Parties --
Ch. 12. Deciding on a Course of Action --
Information Warfare --
Security Scenario Writing --
A Sample Scenario.
Responsibility: by Ronald L. Mendell.

Abstract:

"New advancements being made every day in the field of computer technology have created an equally new and high-tech method of illegal activity - computer crime. To help combat this offense, the author has designed a comprehensive primer to provide a fundamental investigative foundation for readers while moving through the basic phases of a computer crime investigation. The topics discussed cover everything from establishing evidence to developing the case for prosecution. At the conclusion of each chapter, there is a section on "Ideas for Discussion", offering the opportunity for an in-depth exploration of the material presented. This book will be an indispensable resource for college-level students of security, veteran law enforcement personnel, security professionals, and concerned business men and women."--Jacket.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/39202194> # Investigating computer crime : a primer for security managers
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "39202194" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/ilu> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1044759902#Place/springfield_ill> ; # Springfield, Ill.
   schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
   schema:about <http://experiment.worldcat.org/entity/work/data/1044759902#Topic/computer_crimes_investigation_united_states> ; # Computer crimes--Investigation--United States
   schema:about <http://dewey.info/class/363.25968/e21/> ;
   schema:about <http://id.worldcat.org/fast/1204155> ; # United States.
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "1998" ;
   schema:creator <http://viaf.org/viaf/75537130> ; # Ronald L. Mendell
   schema:datePublished "1998" ;
   schema:description "Ch. 1. Solvability Factors -- Ch. 2. Retail Computer Security -- Ch. 3. Evil Whispers and Other Problems -- Ch. 4. Intelligence Gathering -- Ch. 5. The Investigative Process: An Overview -- Ch. 6. Establishing the Corpus Delicti -- Ch. 7. Other Causes for Concern -- Ch. 8. Preserving Evidence -- Ch. 9. Making Sure about the Evidence (Determining the Actual Attack) -- Ch. 10. Determining the Weak Points (Establishing an M.O.) -- Ch. 11. Determining the Responsible Parties -- Ch. 12. Deciding on a Course of Action -- Information Warfare -- Security Scenario Writing -- A Sample Scenario."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1044759902> ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/761456564> ;
   schema:name "Investigating computer crime : a primer for security managers"@en ;
   schema:productID "39202194" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/39202194#PublicationEvent/springfield_ill_c_c_thomas_1998> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1044759902#Agent/c_c_thomas> ; # C.C. Thomas
   schema:reviews <http://www.worldcat.org/title/-/oclc/39202194#Review/-622766766> ;
   schema:workExample <http://worldcat.org/isbn/9780398068912> ;
   schema:workExample <http://worldcat.org/isbn/9780398068905> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/39202194> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1044759902#Place/springfield_ill> # Springfield, Ill.
    a schema:Place ;
   schema:name "Springfield, Ill." ;
    .

<http://experiment.worldcat.org/entity/work/data/1044759902#Topic/computer_crimes_investigation_united_states> # Computer crimes--Investigation--United States
    a schema:Intangible ;
   schema:hasPart <http://id.loc.gov/authorities/subjects/sh85029493> ;
   schema:name "Computer crimes--Investigation--United States"@en ;
    .

<http://id.worldcat.org/fast/1204155> # United States.
    a schema:Place ;
   schema:name "United States." ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
   schema:name "Computer crimes--Investigation"@en ;
    .

<http://viaf.org/viaf/75537130> # Ronald L. Mendell
    a schema:Person ;
   schema:familyName "Mendell" ;
   schema:givenName "Ronald L." ;
   schema:name "Ronald L. Mendell" ;
    .

<http://worldcat.org/isbn/9780398068905>
    a schema:ProductModel ;
   schema:isbn "0398068909" ;
   schema:isbn "9780398068905" ;
    .

<http://worldcat.org/isbn/9780398068912>
    a schema:ProductModel ;
   schema:isbn "0398068917" ;
   schema:isbn "9780398068912" ;
    .

<http://www.worldcat.org/oclc/761456564>
    a schema:CreativeWork ;
   rdfs:label "Investigating computer crime." ;
   schema:description "Online version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/39202194> ; # Investigating computer crime : a primer for security managers
    .

<http://www.worldcat.org/title/-/oclc/39202194#Review/-622766766>
    a schema:Review ;
   schema:itemReviewed <http://www.worldcat.org/oclc/39202194> ; # Investigating computer crime : a primer for security managers
   schema:reviewBody ""New advancements being made every day in the field of computer technology have created an equally new and high-tech method of illegal activity - computer crime. To help combat this offense, the author has designed a comprehensive primer to provide a fundamental investigative foundation for readers while moving through the basic phases of a computer crime investigation. The topics discussed cover everything from establishing evidence to developing the case for prosecution. At the conclusion of each chapter, there is a section on "Ideas for Discussion", offering the opportunity for an in-depth exploration of the material presented. This book will be an indispensable resource for college-level students of security, veteran law enforcement personnel, security professionals, and concerned business men and women."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.