000 03233cam a2200445Mu 4500
001 9781003134817
003 FlBoTFG
005 20240213122825.0
006 m o d
007 cr cnu---unuuu
008 220507s2022 xx o ||| 0 eng d
040 _aOCoLC-P
_beng
_cOCoLC-P
020 _a9781000610499
020 _a1000610497
020 _a9781003134817
_q(electronic bk.)
020 _a1003134815
_q(electronic bk.)
020 _a9781000610475
_q(electronic bk. : PDF)
020 _a1000610470
_q(electronic bk. : PDF)
024 7 _a10.1201/9781003134817
_2doi
035 _a(OCoLC)1314628757
035 _a(OCoLC-P)1314628757
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x083000
_2bisacsh
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aJKVF1
_2bicssc
082 0 4 _a363.25/968
100 1 _aMiddleton, Bruce.
245 1 0 _aCyber Crime Investigator's Field Guide
_h[electronic resource].
250 _a3rd ed.
260 _aMilton :
_bAuerbach Publishers, Incorporated,
_c2022.
300 _a1 online resource (353 p.)
500 _aDescription based upon print version of record.
520 _aTranshumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)--all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition. Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws, rules, and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why, and how in the investigation of cybercrime. Features New focus area on rail transportation, OSINT, medical devices, and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive "the call," arrival on site, chain of custody, and more This book offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, Linux commands, Cisco firewall commands, port numbers, and more.
588 _aOCLC-licensed vendor bibliographic record.
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
650 7 _aCOMPUTERS / Cryptography
_2bisacsh
650 7 _aCOMPUTERS / Internet / Security
_2bisacsh
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003134817
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c4856
_d4856