- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims.
Andere Kunden interessierten sich auch für
- John BandlerCybercrime Investigations41,99 €
- Thomas HoltCybercrime in Progress48,99 €
- Todd FitzgeraldCISO COMPASS110,99 €
- Robert J GirodAdvanced Criminal Investigations and Intelligence Operations54,99 €
- Louise I. ShelleyDark Commerce28,99 €
- Cybersecurity for Decision Makers146,99 €
- Cybercrime Through an Interdisciplinary Lens68,99 €
-
-
-
This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 360
- Erscheinungstermin: 3. Juli 2020
- Englisch
- Abmessung: 186mm x 263mm x 28mm
- Gewicht: 848g
- ISBN-13: 9780367196233
- ISBN-10: 0367196239
- Artikelnr.: 68430325
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 360
- Erscheinungstermin: 3. Juli 2020
- Englisch
- Abmessung: 186mm x 263mm x 28mm
- Gewicht: 848g
- ISBN-13: 9780367196233
- ISBN-10: 0367196239
- Artikelnr.: 68430325
John Bandler and Antonia Merzon served together as Assistant District Attorneys at the New York County District Attorney's Office (DANY), hired by the legendary Robert Morgenthau. They investigated and prosecuted a wide variety of criminal offenses, ranging from those that garnered headlines to the many that received little attention but were equally essential for the administration of justice and protection of the public. Antonia founded and led the Identity Theft Unit (since renamed the Cybercrime and Identity Theft Bureau), recruiting John as an early member. The unit's work quickly revealed the close connection between identify theft and cybercrime, and brought amazing cases, including the Western Express case, which you will read about. John Bandler runs a law firm and a consulting practice that helps organizations and individuals with cybersecurity, cybercrime investigations, and anti-money laundering efforts among other areas. Before becoming a prosecutor, he served as a State Trooper in the New York State Police for eight years, assigned to one of the state's busiest stations that provided full police services to the local community. While serving in the State Police he attended law school at night at Pace University School of Law, and upon graduating he went to work for Mr. Morgenthau. Since leaving government service he has represented a range of clients, from individuals to banks, on many issues ranging from cybersecurity, privacy, anti-fraud, and threats. John is admitted to the bars of New York, Connecticut, and Washington D.C., holds a number of certifications, and writes, lectures, and teaches on law, cybersecurity, cybercrime, and more. Antonia Merzon provides legal and consulting expertise related to security, investigations and law enforcement, especially as they intersect with the worlds of law, technology, privacy, and fraud. She graduated from Fordham University School of Law and then was hired by Mr. Morgenthau. During her time at DANY, she built the new Identity Theft Unit that investigated and prosecuted cybercrime and virtual currency money laundering - before these areas were in the public awareness - and developed the unit's digital forensic and investigative capacity. Cybercrime and traditional investigations are among her specialties, including developing best practices. She also is an expert on a diverse array of investigation and litigation best practices for law enforcement, including the use of body-worn cameras, eyewitness identification, and the electronic recording of custodial interrogations.
Part 1: Cyber Law.
1. Introduction.
2. Cybercrimes and Criminal Statutes.
3. Laws Pertaining to the Criminal Investigative Process.
4. Nation State and Terrorist Nexus.
5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal
Investigation.
6. The Crime (Act).
7. Gathering Leads and Potential Evidence.
8. Following the Money.
9. Gathering Records and Evidence with an Eye towards Potential Trial.
10. Identification and Attribution of the Suspect.
11. Getting Technical.
12. Apprehending the Suspect and Follow on Actions.
13. The Criminal Investigation and Case Continues after Arrest. Part 3: The
Civil Investigation.
14. Comparing the Civil Investigation to the Criminal Investigation.
15. Civil Legal Process Available.
16. E-Discovery.
17. Sharing with Law Enforcement. Part 4: Appendix.
18. Statutes.
19. Criminal Cases.
20. Civil Cases.
21. Cybercrime Investigation Organizations.
22. Cybersecurity Organizations.
1. Introduction.
2. Cybercrimes and Criminal Statutes.
3. Laws Pertaining to the Criminal Investigative Process.
4. Nation State and Terrorist Nexus.
5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal
Investigation.
6. The Crime (Act).
7. Gathering Leads and Potential Evidence.
8. Following the Money.
9. Gathering Records and Evidence with an Eye towards Potential Trial.
10. Identification and Attribution of the Suspect.
11. Getting Technical.
12. Apprehending the Suspect and Follow on Actions.
13. The Criminal Investigation and Case Continues after Arrest. Part 3: The
Civil Investigation.
14. Comparing the Civil Investigation to the Criminal Investigation.
15. Civil Legal Process Available.
16. E-Discovery.
17. Sharing with Law Enforcement. Part 4: Appendix.
18. Statutes.
19. Criminal Cases.
20. Civil Cases.
21. Cybercrime Investigation Organizations.
22. Cybersecurity Organizations.
Part 1: Cyber Law.
1. Introduction.
2. Cybercrimes and Criminal Statutes.
3. Laws Pertaining to the Criminal Investigative Process.
4. Nation State and Terrorist Nexus.
5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal Investigation.
6. The Crime (Act).
7. Gathering Leads and Potential Evidence.
8. Following the Money.
9. Gathering Records and Evidence with an Eye towards Potential Trial.
10. Identification and Attribution of the Suspect.
11. Getting Technical.
12. Apprehending the Suspect and Follow on Actions.
13. The Criminal Investigation and Case Continues after Arrest. Part 3: The Civil Investigation.
14. Comparing the Civil Investigation to the Criminal Investigation.
15. Civil Legal Process Available.
16. E-Discovery.
17. Sharing with Law Enforcement. Part 4: Appendix.
18. Statutes.
19. Criminal Cases.
20. Civil Cases.
21. Cybercrime Investigation Organizations.
22. Cybersecurity Organizations.
1. Introduction.
2. Cybercrimes and Criminal Statutes.
3. Laws Pertaining to the Criminal Investigative Process.
4. Nation State and Terrorist Nexus.
5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal Investigation.
6. The Crime (Act).
7. Gathering Leads and Potential Evidence.
8. Following the Money.
9. Gathering Records and Evidence with an Eye towards Potential Trial.
10. Identification and Attribution of the Suspect.
11. Getting Technical.
12. Apprehending the Suspect and Follow on Actions.
13. The Criminal Investigation and Case Continues after Arrest. Part 3: The Civil Investigation.
14. Comparing the Civil Investigation to the Criminal Investigation.
15. Civil Legal Process Available.
16. E-Discovery.
17. Sharing with Law Enforcement. Part 4: Appendix.
18. Statutes.
19. Criminal Cases.
20. Civil Cases.
21. Cybercrime Investigation Organizations.
22. Cybersecurity Organizations.
Part 1: Cyber Law.
1. Introduction.
2. Cybercrimes and Criminal Statutes.
3. Laws Pertaining to the Criminal Investigative Process.
4. Nation State and Terrorist Nexus.
5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal
Investigation.
6. The Crime (Act).
7. Gathering Leads and Potential Evidence.
8. Following the Money.
9. Gathering Records and Evidence with an Eye towards Potential Trial.
10. Identification and Attribution of the Suspect.
11. Getting Technical.
12. Apprehending the Suspect and Follow on Actions.
13. The Criminal Investigation and Case Continues after Arrest. Part 3: The
Civil Investigation.
14. Comparing the Civil Investigation to the Criminal Investigation.
15. Civil Legal Process Available.
16. E-Discovery.
17. Sharing with Law Enforcement. Part 4: Appendix.
18. Statutes.
19. Criminal Cases.
20. Civil Cases.
21. Cybercrime Investigation Organizations.
22. Cybersecurity Organizations.
1. Introduction.
2. Cybercrimes and Criminal Statutes.
3. Laws Pertaining to the Criminal Investigative Process.
4. Nation State and Terrorist Nexus.
5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal
Investigation.
6. The Crime (Act).
7. Gathering Leads and Potential Evidence.
8. Following the Money.
9. Gathering Records and Evidence with an Eye towards Potential Trial.
10. Identification and Attribution of the Suspect.
11. Getting Technical.
12. Apprehending the Suspect and Follow on Actions.
13. The Criminal Investigation and Case Continues after Arrest. Part 3: The
Civil Investigation.
14. Comparing the Civil Investigation to the Criminal Investigation.
15. Civil Legal Process Available.
16. E-Discovery.
17. Sharing with Law Enforcement. Part 4: Appendix.
18. Statutes.
19. Criminal Cases.
20. Civil Cases.
21. Cybercrime Investigation Organizations.
22. Cybersecurity Organizations.
Part 1: Cyber Law.
1. Introduction.
2. Cybercrimes and Criminal Statutes.
3. Laws Pertaining to the Criminal Investigative Process.
4. Nation State and Terrorist Nexus.
5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal Investigation.
6. The Crime (Act).
7. Gathering Leads and Potential Evidence.
8. Following the Money.
9. Gathering Records and Evidence with an Eye towards Potential Trial.
10. Identification and Attribution of the Suspect.
11. Getting Technical.
12. Apprehending the Suspect and Follow on Actions.
13. The Criminal Investigation and Case Continues after Arrest. Part 3: The Civil Investigation.
14. Comparing the Civil Investigation to the Criminal Investigation.
15. Civil Legal Process Available.
16. E-Discovery.
17. Sharing with Law Enforcement. Part 4: Appendix.
18. Statutes.
19. Criminal Cases.
20. Civil Cases.
21. Cybercrime Investigation Organizations.
22. Cybersecurity Organizations.
1. Introduction.
2. Cybercrimes and Criminal Statutes.
3. Laws Pertaining to the Criminal Investigative Process.
4. Nation State and Terrorist Nexus.
5. Civil and Regulatory Issues Relating to Cybercrime. Part 2: The Criminal Investigation.
6. The Crime (Act).
7. Gathering Leads and Potential Evidence.
8. Following the Money.
9. Gathering Records and Evidence with an Eye towards Potential Trial.
10. Identification and Attribution of the Suspect.
11. Getting Technical.
12. Apprehending the Suspect and Follow on Actions.
13. The Criminal Investigation and Case Continues after Arrest. Part 3: The Civil Investigation.
14. Comparing the Civil Investigation to the Criminal Investigation.
15. Civil Legal Process Available.
16. E-Discovery.
17. Sharing with Law Enforcement. Part 4: Appendix.
18. Statutes.
19. Criminal Cases.
20. Civil Cases.
21. Cybercrime Investigation Organizations.
22. Cybersecurity Organizations.