Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Computer Crime, Investigation, and the Law 1st Edition

4.4 out of 5 stars 10 customer reviews
ISBN-13: 978-1435455320
ISBN-10: 1435455320
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Sell yours for a Gift Card
We'll buy it for $6.88
Learn More
Trade in now
Have one to sell? Sell on Amazon
Buy new
$41.64
In Stock.
Ships from and sold by Amazon.com. Gift-wrap available.
List Price: $49.99 Save: $8.35 (17%)
9 New from $36.60
Qty:1
Computer Crime, Investiga... has been added to your Cart
More Buying Choices
9 New from $36.60 19 Used from $14.55

There is a newer edition of this item:

Computer Crime, Investigation, and the Law
(10)
Out of Print--Limited Availability.
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Save Up to 90% on Textbooks Textbooks
$41.64 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

  • Computer Crime, Investigation, and the Law
  • +
  • Scene of the Cybercrime, Second Edition
  • +
  • Information Security Fundamentals, Second Edition
Total price: $166.48
Buy the selected items together

Editorial Reviews

Review

PART I: COMPUTER CRIME. 1: Introduction to computer crime. 2: A history of computer crime in America. 3: United States Computer laws Part I. 4: United States Computer laws Part II. 5: Techniques and resources of computer crime. 6: Organized computer crime and terrorism. PART II: COMPUTER FORENSICS. 7: Introduction to computer forensics. 8: Collecting evidence from hardware. 9: Collecting evidence from the operating system. 10: Collecting evidence from other sources. PART III: LITIGATION. 11: Experts and Expert Reports. 12: Depositions and Trials. 13: Civil matters relating to computer crime. PART IV: COMPUTER CRIME AND INDIVIDUALS. 14: Protecting Children on the Internet. 15: How to protect your identity on the Internet. 16: Harassment and Stalking via the computer. Appendices. Appendix a: Introduction to computer networks. Appendix b: How to find a computer security expert.

About the Author

Chuck Easttom has 15 years' experience in the IT industry and has been an expert witness on several computer-related cases. He is the author of ten computer-science books including two textbooks on computer security. He was also one of the subject matter experts who helped to create CompTIA's Security+ certification test. He has been a frequent guest speaker on computer security at various computer groups and campuses including Harvard and Columbia. He holds more than a dozen computer industry certifications.

Jeff Taylor is a McKinney, Texas, police detective who began his law-enforcement career in 1982. He is currently assigned to the Criminal Investigations unit, where he specializes in white-collar crimes. In 2003, Detective Taylor became certified in computer-forensic evidence recovery. He uses various computer software systems, including EnCase, Helix, and I-Look. He has received training and certifications from the FBI, Cyber Evidence Inc., the National White Collar Crime Center, and the High Intensity Drug Trafficking Area (HIDTA) task force. Detective Taylor is on the instructor staff at the Collin County Law Enforcement Academy, where he teaches a course on electronic crime scene investigations.
If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 86%). Print edition purchase must be sold by Amazon. Learn more.




Product Details

  • Paperback: 528 pages
  • Publisher: Cengage Learning PTR; 1 edition (April 9, 2010)
  • Language: English
  • ISBN-10: 1435455320
  • ISBN-13: 978-1435455320
  • Product Dimensions: 7.4 x 1.2 x 9.1 inches
  • Shipping Weight: 2.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (10 customer reviews)
  • Amazon Best Sellers Rank: #252,095 in Books (See Top 100 in Books)

More About the Author

I have been in the IT profession for many years. I have authored 19 computer science books. I also have six patents, including a distributed steganography method. I was a subject matter expert for CompTIA in the creation of their Security+, Linux+, and Server+ certification tests and on the Job Task Analysis team for CEH v8. I hold 32 IT certifications (A+, Network+, iNet+, Linux+, Server+, MCP, MCAD, MCSA, MCSE, MCDBA,MCTS, MCITP, CEH, CHFI, CISSP, CCFP, ISSAP, and more). You can find out more about me at www.ChuckEasttom.com

I am frequently a speaker on computer science related topics, often specifically on computer security and related subjects. In the past I have been a speaker at: Hacker Halted, TakedownCon, Secure World, ISC2 Security Congress, Harvard Computer Society, Columbia University ACM chapter, UTD ACM Chapter, SMU Research Colloquium, Hakon India, to name a few.

You can also join my FaceBook Fan page at http://www.facebook.com/#!/pages/Chuck-Easttom-Fan-Page/112433175435672?ref=ts

I love teaching and writing. And I hope my books are a vehicle for learning. It is my goal to teach you new technologies in a way that it very readable, conversational.


I live in Texas (near Dallas) and am married to a wonderful woman (Teresa).

Customer Reviews

Top Customer Reviews

Format: Paperback Verified Purchase
excellent book, it's very interesting and focuses mainly on how criminals use the computers & the internet to commit their crimes, what techniques hackers use and everything about the current cyber-crime laws.
Comment 1 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
This book has a lot of information. It is easy to read. The chapter lengths are manageable. The print is a good size to read.
Comment 1 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
If your into security management, or studying CISSP, I think this book makes a great reference to go along with the topic.
Comment 1 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Useful information. Used some of the material to prep for a certification exam in forensics.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Bought it for use with a university course...the author is OVERLY repetitive and BORING.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Want to discover more products? Check out these pages to see more: web crawler software, free $500 gift cards, user mode linux, cyber investigating, computer and sociology