MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Computer crime : a crime-fighter's handbook / David Icove, Karl Seger and William VonStorch.

By: Icove, David.
Contributor(s): Seger, Karl | VonStorch, William.
Material type: materialTypeLabelBookPublisher: Sebastopol, CA : O'Reilly & Associates, 1995Description: xvi,437p ; 24cm + pbk.ISBN: 1565920864.Subject(s): Computer crimes | Computer security | Electronic data processing departments -- Security measures | Computers -- Law and legislation -- United StatesDDC classification: 005.8
Contents:
Part I: Overview -- Introduction to computer crime -- What are the crimes? -- Who commits computer crimes? -- What are the laws? -- Part II: Preventing computer crime -- What is at risk? -- Physical security -- Personnel security -- Communications security -- Operations security -- Part III: Handling computer crime -- Planning how to handle a computer crime -- Investigating a computer crime -- Prosecuting a computer crime -- Part IV: Computer crime laws.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00126721
General Lending MTU Bishopstown Library Store Item 005.8 (Browse shelf(Opens below)) 1 Available 00015324
Total holds: 0

Enhanced descriptions from Syndetics:

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods. Computer Crime: A Crimefighter's Handbook is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators.Part I of the book contains a discussion of computer crimes, the computer criminal, and computer crime laws. It describes the various categories of computer crimes and profiles the computer criminal (using techniques developed for the FBI and other law enforcement agencies). Part II outlines the the risks to computer systems and personnel, operational, physical, and communications measures that can be taken to prevent computer crimes. Part III discusses how to plan for, investigate, and prosecute computer crimes, ranging from the supplies needed for criminal investigation, to the detection and audit tools used in investigation, to the presentation of evidence to a jury.Part IV of the book contains a compendium of the computer-related U.S. federal statutes and all of the statutes of the individual states, as well as representative international laws. Part V contains a resource summary, detailed papers on computer crime, and a sample search warrant for a computer crime.

Includes index.

Part I: Overview -- Introduction to computer crime -- What are the crimes? -- Who commits computer crimes? -- What are the laws? -- Part II: Preventing computer crime -- What is at risk? -- Physical security -- Personnel security -- Communications security -- Operations security -- Part III: Handling computer crime -- Planning how to handle a computer crime -- Investigating a computer crime -- Prosecuting a computer crime -- Part IV: Computer crime laws.

Powered by Koha