MARC details
000 -LEADER |
fixed length control field |
05501cam a22003258i 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119596301 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119596300 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119596325 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119596327 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119596318 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119596319 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
CUS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Edwards, Graeme |
245 10 - TITLE STATEMENT |
Title |
Cybercrime investigators handbook / |
Statement of responsibility, etc. |
Graeme Edwards. |
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
Hoboken, New Jersey : |
Name of publisher, distributor, etc. |
John Wiley & Sons, Inc., |
Date of publication, distribution, etc. |
[2019] |
300 ## - DESCRIPTION |
Extent |
1 online resource |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Cover; Title Page; Copyright; Contents; List of Figures; About the Author; Foreword; Acknowledgments; Chapter 1 Introduction; Chapter 2 Cybercrime Offenses; Potential Cybercrime Offenses; Industrial Espionage; Theft of Information Such as Identities, Staff Files, and Accounts; Computer Hacking to Gain Access to System Resources; Gaining or Exceeding Authorized Access Levels to Obtain Highly Restricted Data; Exploiting Information Security Weaknesses through the Supply Chain, Including Third‐Party Contractors; Stealing Credit Card Data for Selling Online, or Card‐Not‐Present Fraud |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Gaining Access to a System or Device through Malicious SoftwareDamaging the Reputation of a Competitor to Gain a Market Advantage; Changes to Computer Systems or Devices; Vandalism to Prove the Skills of the Attacker; Drive‐by Downloads of Malicious Software; Interfering with Access to a Network; Ransomware; Phishing Attacks and Money Laundering; Business Email Compromise Fraud; Social Engineering Fraud; Cybercrime Case Study; Notes; Chapter 3 Motivations of the Attacker; Common Motivators; Revenge; Opportunity; Greed; Test of Skill; Business Competitor; Professional Criminal |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Issue‐Motivated AttackerGeopolitics; Terrorism; Cybercrime Case Study I; Cybercrime Case Study II; Note; Chapter 4 Determining That a Cybercrime Is Being Committed; Cyber Incident Alerts; Attack Methodologies; Cybercrime Case Study I; Cybercrime Case Study II; Notes; Chapter 5 Commencing a Cybercrime Investigation; Why Investigate a Cybercrime?; The Cyber Investigator; Management Support; Is There a Responsibility to Try to Get the Data Back?; Cybercrime Case Study; Notes; Chapter 6 Legal Considerations When Planning an Investigation; Role of the Law in a Digital Crimes Investigation |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Protecting Digital EvidencePreservation of the Chain of Custody; Protection of Evidence; Legal Implications of Digital Evidence Collection; Cybercrime Case Study; Note; Chapter 7 Initial Meeting with the Complainant; Initial Discussion; Complainant Details; Event Details; Cyber Security History; Scene Details; Identifying Offenses; Identifying Witnesses; Identifying Suspects; Identifying the Modus Operandi of Attack; Evidence: Technical; Evidence: Other; Cybercrime Case Study; Chapter 8 Containing and Remediating the Cyber Security Incident; Containing the Cyber Security Incident |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Eradicating the Cyber Security IncidentNote; Chapter 9 Challenges in Cyber Security Incident Investigations; Unique Challenges; Defining Investigation Boundaries and Management Objectives; Identifying Potential Offenses (Criminal and/or Civil); Identifying Compromised Data and/or Resources; Identifying Suspects and Motivations; Identifying Exploited Vulnerabilities; Securing Evidence; Understanding the Legal Jurisdiction Where the Incident Occurred and the Evidence Exists; Locating Digital Evidence in a Timely Manner; Maintaining the Chain of Evidence across Multiple Jurisdictions |
650 #0 - SUBJECT |
Keyword |
Computer crimes |
650 #7 - SUBJECT |
Keyword |
Computer crimes |
856 40 - ONLINE RESOURCES |
url |
https://doi.org/10.1002/9781119596318 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
e-Books |