Enter your mobile number or email address below and we'll send you a link to download the free Kindle Reading App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry.
> Shop now
Being the singular author on a comprehensive book about cybercrime has to be a daunting task. The subject area is so broad that a sole author can't be expected to be deeply knowledgeable about all aspects of the subject. Robert Moore wisely cautions the reader in the introduction that the goal of the book is to serve as a starting point in understanding the world of cybercrime rather than being a vehicle that will transform the reader into an expert. Moore largely hits the mark with this book. I found it to be a good overview of the world of cybercrime with an emphasis on computer forensics.
My primary concern with this work is that it feels very dated during portions of the book. For example, the content that deals with hacking provides a wonderful history of the term and how the public came to learn about this sort of activity, but the actual technical portion of the discussion needs to be updated. There are very few tools that are discussed specifically in the text and some of them are quite out of date. For example, the author talks about hackers using tools like nmap, but also spends time talking about SATAN. A book released in 2011 that talks about hacking really should concentrate on introducing the reader to more contemporary tools such as Metasploit and as well as discussing some of the more classic tools. While there isn't anything wrong talking about popular historical tools, they should be placed in the proper context with current tools.
The computer forensics portions of the book suffer from a similar problem. The book mentions commonly used tools such as EnCase and FTK, but treats the NTI tools as if they were still widely in use by the digital forensics community. They aren't.Read more ›
Was this review helpful to you?