Narrow your search

Library

Odisee (17)

Thomas More Kempen (17)

Thomas More Mechelen (17)

UCLL (17)

VIVES (17)

KU Leuven (16)

ULiège (16)

LUCA School of Arts (11)

UGent (11)

Vlerick Business School (9)

More...

Resource type

book (20)


Language

English (20)


Year
From To Submit

2016 (1)

2015 (2)

2014 (2)

2013 (3)

2012 (1)

More...
Listing 1 - 10 of 20 << page
of 2
>>
Sort by
The Investigator's Guide to Computer Crime
Author:
ISBN: 0398084580 9780398084585 0398076014 9780398076016 0398076022 9780398076023 Year: 2006 Publisher: Springfield : Charles C Thomas,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. Section I establishes standards for computer crime investigation, the computer crime inve


Book
XBOX 360 forensics : a digital forensics guide to examining artifacts
Authors: ---
ISBN: 128295606X 9786612956065 1597496243 1597496235 9781597496247 9781597496230 Year: 2011 Publisher: Burlington, Mass. : Elsevier Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the likelihood that a criminal investigator encounters an XBOX 360 is a certainty. The digital forensics community has already begun to receive game consoles for examination, but there is no map for them to follow as there may be with other digital media. X


Book
Python forensics : a workbench for inventing and sharing digital forensic technology
Authors: --- --- ---
ISBN: 0124186831 0124186769 1306820545 9780124186835 9781306820547 9780124186767 Year: 2014 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile


Book
Digital forensics with open source tools
Authors: ---
ISBN: 1283070073 9786613070074 1597495875 1597495867 9781597495875 9781597495868 9781283070072 6613070076 Year: 2011 Publisher: Waltham, MA : Syngress, an imprint of Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners Details


Book
Computer crimes and digital investigations
Author:
ISBN: 9780198705598 019870559X Year: 2016 Publisher: Oxford : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date.Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accessible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field.Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organizations such as the United Nations, places cybercrime in its international context.


Book
Internet crimes, torts and scams : investigation and remedies
Author:
ISBN: 9780195373516 0195373510 Year: 2010 Publisher: Oxford : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Internet Crimes, Torts and Scams: Investigation and Remedies helps attorneys understand the increasing range of illegal and malicious internet activity and a similarly expanding number of response or enforcement options. Reflecting a "real-world" dynamic, the book is problem-oriented and cuts across many practice areas including intellectual property enforcement, libel, third-party liability, forensics, and global jurisdictional issues. It will aid practitioners who need to identify not only the type of problem a client faces but how to investigate and best respond to protect a client's interests in any given situation. In Internet Crimes, Torts and Scams, Melise Blakeslee draws upon her extensive experience investigating and litigating internet-based legal problems to produce a unique and accessible book for any attorney advising a client on internet-related risks. Topics covered in this comprehensive text include: investigation techniques such as how to interpret email headers, global jurisdiction, investigation of counterfeiters, intellectual property, the problems of anonymity on the Internet, and preparation of complaints. Also included are extensive appendices, including ICANN complaints, motions, a list of online resources, and guidelines for the seizure of electronic evidence.


Book
Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects
Authors: ---
ISBN: 9786611020262 1281020265 1597499846 1597499854 Year: 2013 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin


Book
Introduction to social media investigation : a hands-on approach
Authors: --- ---
ISBN: 012801802X 0128016566 1336202629 9781336202627 9780128018026 9780128016565 Year: 2015 Publisher: Amsterdam, [Netherlands] : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

If you're interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources. Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses


Book
Android forensics : investigation, analysis, and mobile security for Google Android
Authors: ---
ISBN: 1283281465 9786613281463 1597496529 1597496510 9781597496520 9781597496513 9781283281461 6613281468 Year: 2011 Publisher: Waltham, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of

Keywords

Android (Electronic resource). --- Computer crimes - Investigation. --- Computer crimes -- Investigation. --- Data recovery (Computer science). --- Google. --- Mobile computing - Security measures. --- Smartphones - Security measures. --- Smartphones -- Security measures. --- Smartphones --- Mobile computing --- Data recovery (Computer science) --- Computer crimes --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Security measures --- Investigation --- Security measures. --- Investigation. --- Android (Electronic resource) --- Information Technology --- General and Others --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Smart cell phones --- Smart phones --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- BackRub --- Android operating system (Electronic resource) --- Android OS (Electronic resource) --- Google Android (Electronic resource) --- Android mobile operating system (Electronic resource) --- Electronic data processing --- Context-aware computing --- Portable computers --- Cell phones --- Pocket computers --- Criminal investigation --- Informatique mobile --- Données --- Informatique légale. --- Mesures de sûreté. --- Récupération (informatique) --- Google Android --- Informatique légale --- Données --- Informatique légale --- Mesures de sûreté. --- Récupération (informatique)


Book
Digital forensics processing and procedures
Authors: ---
ISBN: 1597497452 1597497428 1299833144 9781299833142 9781597497459 9781597497428 Year: 2013 Publisher: Amsterdam Boston Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first digital forensics book that covers the complete life cycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building a

Listing 1 - 10 of 20 << page
of 2
>>
Sort by