My Account | Home| Bulletin Board| Cart | Help
Close Session
IISER-KIndian Institute of Science Education & Research - Kolkata
Quick Search
Search Terms:
All Documents
Books
Newspapers
Periodicals
Articles
Theses
E-Books
Database : IISERK

Set Session Filters
Login to ask the library to add a book.
Active Filter Settings
No Active Filters
There are 0 titles in your cart.

Search History
ty:m & bl:m
Special Collections: Maps
Special Collections: Music Scores
Special Collections: Government Publications
Serial Collections: Newspapers
Special Collections: Audio Cassettes
Recommended Reading
first record | previous record | next record | last record
full | marc
Record 141 of 324
You searched IISERK - Special Collections: Maps
Tag In 1 In 2 Data
001  vtls000012308
003  IISER-K
005  20140514150500.0
006  m d
007  cr cn|||||||||
008  090617s2006 ne ab sb 001 0 eng d
020  \a 9780750679299
020  \a 0750679298
037  \a 113041:113129 \b Elsevier Science & Technology \n http://www.sciencedirect.com
039 9\a 201405141505 \b VLOAD \y 200906171900 \z VLOAD
049  \a TEFA
08204\a 363.25/968 \2 22
1001 \a Kovacich, Gerald L.
24510\a High-technology crime investigator's handbook \h [electronic resource] : \b establishing and managing a high-technology crime prevention program / \c Gerald L. Kovacich and Andy Jones.
250  \a 2nd ed.
260  \a Amsterdam ; \a Boston : \b Butterworth-Heinemann/Elsevier, \c c2006.
300  \a xxvii, 470 p. : \b ill., map ; \c 23 cm.
504  \a Includes bibliographical references and index.
5050 \a SECTION I Introduction to the High Technology Crimes Environment -- Chapter 1. What Investigators Should Know About the High Technology Supported Global Threats -- Chapter 2. The High Technology Crimes Miscreants, Profiles, Motives and Philosophies. -- Chapter 3. The Basic Techniques Used by High Technology Crimes Miscreants -- Chapter 4. The Basic Information Systems Security Techniques Being Used to Defend Against the High Technology Crimes Miscreants -- SECTION II High-Technology Incidents and Crime Investigations -- Chapter 5. Investigating High Technology Crimes -- Chapter 6. Responding to High-Technology Incidents and Crimes -- Chapter 7. The Collection of Evidence -- Chapter 8. Interviews and Interrogations -- Chapter 9. An Introduction to Computer Forensics -- Chapter 10. Establishing and Managing a Computer Forensics Laboratory -- Chapter 11. High Technology Crimes: Case Summaries -- SECTION III Overview of the High Technology Crimes Investigations Profession and Unit -- Chapter 12. The Global Enterprise Corporation (GEC) Model -- Chapter 13. Understanding the Role of the High Technology Crimes Investigator and an Anti-Crimes Unit in the Business and Management Environment -- Chapter 14. The High Technology Crimes Investigations Unit Strategic, Tactical, and Annual Plans -- Chapter 15. High Technology Anti-Crimes Investigations Program and Organization -- Chapter 16. High Technology Crimes Investigations Functions -- Chapter 17. Sources, Networking and Liaison -- Chapter 18. High Technology Crime Investigations Unit Metrics Management System -- Chapter 19. Outsourcing High-Technology Investigations Pros and Cons -- SECTION IV - High Technology Crime Investigation Challenges of the 21st Century -- Chapter 20. The Future of High Technology and Its Impact on Working in a Global Information Environment -- Chapter 21. The Future of High Technology Crimes, Security and the Criminal Justice Systems -- Chapter 22. Terrorism Crime or War? Its Impact on the High Technology Incidents and Crimes Investigations -- Chapter 23. The Future of the High Technology Crimes Investigator Profession -- Chapter 24. Developing a Career as a High Technology Crimes Investigator -- Chapter 25. Marketing Yourself as a Successful High Technology Crimes Investigator -- Chapter 26. Becoming a High Technology Consultant -- Chapter 27. Conclusions and Final Thoughts.
520  \a The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator. * Provides an understanding of the global information environment and its threats * Explains how to establish a high-technology crime investigations unit and prevention program * Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers.
533  \a Electronic reproduction. \b Amsterdam : \c Elsevier Science & Technology, \d 2007. \n Mode of access: World Wide Web. \n System requirements: Web browser. \n Title from title screen (viewed on Aug. 2, 2007). \n Access may be restricted to users at subscribing institutions.
650 0\a Criminal investigation.
650 0\a High technology.
655 7\a Electronic books. \2 local
7001 \a Jones, Andy, \d 1952-
7102 \a ScienceDirect (Online service)
7761 \c Original \z 0750679298 \z 9780750679299 \w (DLC) 2006004111 \w (OCoLC)63680026
85640\3 ScienceDirect \u http://www.sciencedirect.com/science/book/9780750679299 \z An electronic book accessible through the World Wide Web; click for information \y An electronic book accessible through the World Wide Web; click for information \y ScienceDirect
85641\3 Table of contents only \u http://www.loc.gov/catdir/toc/ecip068/2006004111.html \y Table of contents only
85642\3 Publisher description \u http://www.loc.gov/catdir/enhancements/fy0632/2006004111-d.html \y Publisher description

Keyword Search

 Words: Search Type:
 
 

Database: IISERK

Any filter options that are chosen below will be combined with the Session Filters and applied to the search.
Nature of Contents Filters Format Filters

Including Excluding

Including Excluding
Language Filters Place of Publication Filters

Including Excluding

Including Excluding
Publication Date Context Date
  -     -  

Set Session Filters
Select below to return to the last:
Copyright © 2014 VTLS Inc. All rights reserved.
VTLS.com