Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective.
This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Robert Moore is an assistant professor of criminal justice at Troy University in Troy, Alabama.
Inhaltsangabe
1. An Introduction to High-Technology Crime 2. Hackers, Crackers, and Phone Phreaks 3. Identity Theft: Tools and Techniques of Twenty-First Century Bandits 4. Digital Child Pornography and the Abuse of Children in Cyberspace 5. Financial Fraud and Con Artistry on the Net 6. Online Harassment and Cyberstalking 7. Intellectual Property Theft and Digital File Sharing 8. Investigating on the Web: Examining Online Investigations and Sting Operations 9. Seizure of Digital Evidence 10. Executing a Search Warrant for Digital Evidence 11. An Introduction to Computer Forensics 12. The Future of High-Technology Crime 13. An Introduction to Cybercriminology
1. An Introduction to High-Technology Crime 2. Hackers, Crackers, and Phone Phreaks 3. Identity Theft: Tools and Techniques of Twenty-First Century Bandits 4. Digital Child Pornography and the Abuse of Children in Cyberspace 5. Financial Fraud and Con Artistry on the Net 6. Online Harassment and Cyberstalking 7. Intellectual Property Theft and Digital File Sharing 8. Investigating on the Web: Examining Online Investigations and Sting Operations 9. Seizure of Digital Evidence 10. Executing a Search Warrant for Digital Evidence 11. An Introduction to Computer Forensics 12. The Future of High-Technology Crime 13. An Introduction to Cybercriminology
1. An Introduction to High-Technology Crime 2. Hackers, Crackers, and Phone Phreaks 3. Identity Theft: Tools and Techniques of Twenty-First Century Bandits 4. Digital Child Pornography and the Abuse of Children in Cyberspace 5. Financial Fraud and Con Artistry on the Net 6. Online Harassment and Cyberstalking 7. Intellectual Property Theft and Digital File Sharing 8. Investigating on the Web: Examining Online Investigations and Sting Operations 9. Seizure of Digital Evidence 10. Executing a Search Warrant for Digital Evidence 11. An Introduction to Computer Forensics 12. The Future of High-Technology Crime 13. An Introduction to Cybercriminology
1. An Introduction to High-Technology Crime 2. Hackers, Crackers, and Phone Phreaks 3. Identity Theft: Tools and Techniques of Twenty-First Century Bandits 4. Digital Child Pornography and the Abuse of Children in Cyberspace 5. Financial Fraud and Con Artistry on the Net 6. Online Harassment and Cyberstalking 7. Intellectual Property Theft and Digital File Sharing 8. Investigating on the Web: Examining Online Investigations and Sting Operations 9. Seizure of Digital Evidence 10. Executing a Search Warrant for Digital Evidence 11. An Introduction to Computer Forensics 12. The Future of High-Technology Crime 13. An Introduction to Cybercriminology
Rezensionen
"This book gives a well-structured account of the ingredients, responses and theories associated with cybercrime. Each chapter is accompanied by a set of review questions and a list of online resources. Additionally, many of the chapters have a list of recommended further reading as well as an 'in the news' item that serves to highlight the relevance of the foregoing material."-George R S Weir, University of Strathclyde
"This book gives a well-structured account of the ingredients, responses and theories associated with cybercrime. Each chapter is accompanied by a set of review questions and a list of online resources. Additionally, many of the chapters have a list of recommended further reading as well as an 'in the news' item that serves to highlight the relevance of the foregoing material."- George R S Weir, University of Strathclyde
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826