The New Forensics

Author: Joe Anastasi
Publisher: John Wiley & Sons
ISBN: 9780471457954
Format: PDF, Kindle
Download Now
An in-depth look at the tools, techniques, and tactics used in computer forensics The New Forensics introduces readers to the world of business forensics, using interesting vignettes, interviews, and actual crime reports. It examines recent cases in which the use of computer forensics led to evidence linking executives to fraud and covers issues such as the theft of trade secrets, the use of data mining, money laundering, and other types of theft and fraud. Author Joe Anastasi, a well-respected leader in computer and business forensics, leads the reader on a shadowy journey through top-secret government offices and real-life business investigations while covering the moral and legal issues surrounding corporate crime. Case studies, stories, and interviews help highlight important issues and move the book out of the theoretical into the realm of actual practice. Joe Anastasi (San Francisco, CA) serves as the Global Leader for Deloitte Forensics, which includes the operation of several Cybercrime Computer Forensics labs located around the world. He is a member of the High-Tech Crime Investigation Association and the Association of Certified Fraud Examiners.

Forensic Accounting and Fraud Examination

Author: Mary-Jo Kranacher
Publisher: John Wiley & Sons
ISBN: 047043774X
Format: PDF, ePub, Mobi
Download Now
Forensic Accounting provides comprehensive coverage of fraud detection and deterrence and includes the broader educational material of the forensic accounting field with all the necessary accompaniments. The text follows the model curriculum for education in fraud and forensic funded by the U.S. national Institute of Justice and developed by a Technical Working Group of experts in the field. The text serves as a comprehensive and authoritative resource for teaching forensic accounting concepts and procedures that is also and appropriate and pedagogically ready for class room use. This easy to read, comprehensive textbook includes case study examples to clearly explain technical concepts and bring the material to life.

Encyclopedia of White Collar and Corporate Crime

Author: Lawrence M. Salinger
Publisher: SAGE Publications
ISBN: 1506332773
Format: PDF, Docs
Download Now
Since the first edition of the Encyclopedia of White Collar and Corporate Crime was produced in 2004, the number and severity of these crimes have risen to the level of calamity, so much so that many experts attribute the near-Depression of 2008 to white-collar malfeasance, namely crimes of greed and excess by bankers and financial institutions. Whether the perpetrators were prosecuted or not, white-collar and corporate crime came near to collapsing the U.S. economy. In the 7 years since the first edition was produced we have also seen the largest Ponzi scheme in history (Maddoff), an ecological disaster caused by British Petroleum and its subcontractors (Gulf Oil Spill), and U.S. Defense Department contractors operating like vigilantes in Iraq (Blackwater). White-collar criminals have been busy, and the Second Edition of this encyclopedia captures what has been going on in the news and behind the scenes with new articles and updates to past articles.

Trusted Criminals White Collar Crime In Contemporary Society

Author: David O. Friedrichs
Publisher: Cengage Learning
ISBN: 0495600822
Format: PDF, Kindle
Download Now
This comprehensive text helps students understand the problems involved in studying white collar crime, explanations for crime, the principal focus of the crimes, and the character of the legal and criminal justice response to the crime. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Guide to Computer Forensics and Investigations

Author: Bill Nelson
Publisher: Cengage Learning
ISBN: 1435498836
Format: PDF
Download Now
Learners will master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections. Learn how to set up a forensics lab, how to acquire the proper and necessary tools, and how to conduct the investigation and subsequent digital analysis. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

System Forensics Investigation and Response

Author: John R. Vacca
Publisher: Jones & Bartlett Publishers
ISBN: 0763791342
Format: PDF, ePub, Docs
Download Now
Computer crimes call for forensics specialists---people who know to find and follow the evidence. System Forensics, Investigation, and Response examines the fundamentals of system forensics what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation, including evidence collection, investigating information-hiding, recovering data, and more. The book closes with an exploration of incident and intrusion response, emerging technologies and future directions of the field, and additional system forensics resources. The Jones & Bartlett Learning Information Systems Security & Assurance Series delivers fundamental IT security principles packed with real world applications and examples for IT Security, Cybersecurity, Information Assurance, and Information Systems, Security programs. Authored by Certified Information Systems Security professionals (CISSPs), and reviewed by leading technical experts in the field, these books are current, forward-thinking resources that enable readers to solve the cybersecurity challenges of today and tomorrow.

Criminal Justice

Author: Phyllis B. Gerstenfeld
Publisher: Salem PressInc
ISBN: 9781587652202
Format: PDF
Download Now
Contains 625 alphabetically arranged entries that examine various aspects of criminal justice in the U.S., covering criminals, codes and categories of law, law enforcement agencies, courts, corrections, the U.S. Constitution, and Supreme Court rulings. Includes a time line, personages and subject indexes, and other reference materials.

Trusted Criminals

Author: David O. Friedrichs
Publisher: Wadsworth Publishing Company
ISBN:
Format: PDF, ePub, Mobi
Download Now
This comprehensive text helps students understand the problems involved in studying white collar crime, explanations for crime, the principal focus of the crimes, and the character of the legal and criminal justice response to the crime.

Hacking Exposed Computer Forensics Second Edition

Author: Aaron Philipp
Publisher: McGraw Hill Professional
ISBN: 0071626786
Format: PDF, ePub, Docs
Download Now
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny