- Paperback: 749 pages
- Publisher: Syngress Publishing; 1 edition (August 10, 2002)
- Language: English
- ISBN-10: 1931836655
- ISBN-13: 978-1931836654
- Product Dimensions: 7.4 x 1.3 x 9 inches
- Shipping Weight: 2.9 pounds
- Average Customer Review: 19 customer reviews
- Amazon Best Sellers Rank: #2,462,298 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Scene of the Cybercrime: Computer Forensics Handbook 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
"Children of Blood and Bone"
Tomi Adeyemi conjures a stunning world of dark magic and danger in her West African-inspired fantasy debut. Learn more
Customers who bought this item also bought
Customers who viewed this item also viewed
What other items do customers buy after viewing this item?
About the Author
Debra Littlejohn Shinder is a former police sergeant and police academy instructor, turned IT professional. She and her husband, Dr. Thomas W. Shinder, have provided network consulting services to businesses and municipalities, conducted training at colleges and technical training centers, and spoken at seminars around the country. Deb specializes in networking and security, and she and Tom have written numerous books, including the best selling ConfiguringISA Server 2000. Deb is the author of over 100 articles for print publications and electronic magazines such as TechProGuild, CNET, 8Wire, and Cramsession.com. Deb is a member of the editorial board of the Journal of Police CrisisNegotiations and the advisory board of the Eastfield College Criminal Justice Training Center.
Other Books by Debra Littlejohn Shinder:
Configuring ISA Server 2000: Building Firewalls for Windows 2000, ISBN 1-928994-29-6. Syngress Publishing, 2001, $49.95.
Troubleshooting Windows 2000 TCP/IP, ISBN 1-928994-11-3. Syngress Publishing, 2000, $49.94.
Computer Networking Essentials, ISBN 1-587130-38-6. Cisco Press, 2001, $49.95.
MCSE Windows 2000 Accelerated Study Guide, ISBN 0-072125-00-4. Osborne/McGraw Hill, 2000, $59.99.
MCSE Windows 2000 Professional Study Guide, ISBN 0072123893. Osborne/McGraw Hill, 2000, $49.99.
MCSE Windows 2000 Server Study Guide, ISBN 0-072123-86-9. Osborne/McGraw Hill, 2000, $49.99.
MCSE Windows 2000 Network Administration Study Guide, ISBN 0-072123-83-4. Osborne/McGraw Hill, 2000, $49.99.
MCSE Windows 2000 Directory Services Administration Study Guide, ISBN 0-072123-80-X. Osborne/McGraw Hill,2000, $49.99.
MCSE Designing a Windows 2000 Network Study Guide, ISBN0-072124-94-6. Osborne/McGraw Hill, 2000, $49.99.
MCSE Designing a Windows 2000 Directory Service Study Guide, ISBN 0-072125-03-9. Osborne/McGraw Hill, 2000, $49.99.
MCSE Designing Security for a Windows 2000 NetworkStudy Guide, ISBN 0-072124-97-0.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Most books on computer and network security are written for the techie trying to secure their assets from outside attack. Obviously, there's a huge need for that information. But it seems that there is virtually nothing written from the law enforcement perspective on computer security. That's a major problem in two ways... For one, there are too few law enforcement personnel that understand exactly what cybercrime is and how it can be detected, fought, and prosecuted. That's probably the audience that would benefit most from this book. Second, most technical personnel don't know what to do in order to successfully build a case and prosecute an attacker once an intrusion has occurred. That's the other audience that will gain the most from reading Shinder's work.
The book includes the following chapters: Facing the Cybercrime Problem Head On; Reviewing the History of Cybercrime; Understanding the People on the Scene; Understanding Computer Basics; Understanding Network Basics; Understanding Network Intrusions and Attacks; Understanding Cybercrime Prevention; Implementing System Security; Implementing Cybercrime Detection Techniques; Collecting and Preserving Digital Evidence; Building the Cybercrime Case
The hardcore network security administrator will probably already know most of the information in the "Understanding..." chapters. But unless they are adept or experienced in forensic analysis, the last three chapters will be crucial information for them. Without the knowledge of how to preserve evidence, there's a good chance that you'll never have the satisfaction of seeing your attacker prosecuted. Higher level managers of a corporate security department will find all of this information useful, as they may not be as hands-on as the administrators and may not understand what threats and risks are present in today's environment.
From the law enforcement perspective, it's all good. Fighting cybercrime is so different than regular law enforcement. This is the perfect volume to give the budding cybercop all the information they need to get up to speed with how crime is conducted electronically. I would recommend that this book be required reading for law enforcement and prosecution personnel.
The book is well written with plenty of real-life examples of criminal activities and legal scenarios. It's one of the most engrossing technical reads I've had in awhile. A definite recommended read...
Don't bother reading this book if you have even a modicum of tech savvy - the writer won't be telling you anything that you don't already know or figured out for yourself hands on. BTW, most of the URLS provided as reference in this book are 404, which is only to be expected given its 2002 publication date, however I include the comment here in this review because if you're like me, then you like to check out the resources the writer used.
Lastly, by no stretch of the imagination should this title be considered a computer forensics book. The only audience that will consider said title as such are executive officers and marketing types who don't have a clue.
The corporate information security professionals will find the technical details misleading and over simplified but will definitely benefit from the detailed discussions of proper process and procedure.
The author leverages her experience as a police officer and academy instructor to good effect in educating us on the viewpoint of the law enforcement community and the requirements we must meet in collecting and preserving admissible evidence.
My advice would be to VERY lightly skim the "technical" material on vulnerabilities, exploits and defenses while reserving detailed reading for the material dealing with process and procedures as well as the logistics for involving and interacting with law enforcement.
Most recent customer reviews
At times, tries to be too much to too many.
But good info.
This book covers all aspects of information security but the title of the book is kind of misleading as the book only has 2 chapters that talk about anything close to...Read more