Página InicialGruposDiscussãoExplorarZeitgeist
Pesquisar O Sítio Web
Este sítio web usa «cookies» para fornecer os seus serviços, para melhorar o desempenho, para analítica e (se não estiver autenticado) para publicidade. Ao usar o LibraryThing está a reconhecer que leu e compreende os nossos Termos de Serviço e Política de Privacidade. A sua utilização deste sítio e serviços está sujeita a essas políticas e termos.
Hide this

Resultados dos Livros Google

Carregue numa fotografia para ir para os Livros Google.

High-Technology Crime: Investigating Cases…
A carregar...

High-Technology Crime: Investigating Cases Involving Computers (with 3.5… (edição 1995)

por Kenneth S Rosenblatt (Autor)

MembrosCríticasPopularidadeAvaliação médiaDiscussões
4Nenhum(a)2,900,215Nenhum(a)Nenhum(a)
This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers. The book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers; for example, the crime of breaking and entering into computers flourished after businesses began connecting computers to sophisticated telecommunications networks. High-technology crime also includes traditional crimes so transformed by computer technology that investigators handling such cases must be familiar with computers and the high-technology industry. One chapter discusses basic principles common to investigating high- technology crime, and three chapters examine the most common high-technology crimes: theft of components, computer intrusion, and theft of information. These three chapters provide readers, including those with no technical background or competence, with the necessary technical information to investigate those crimes, along with a procedure for doing so. An appendix contains a checklist for these investigations. The second part of the book examines a growing challenge facing every law enforcement agency in the United States: safely and legally obtaining evidence stored within computers. Obtaining evidence from a computer without damaging equipment or losing data is just one part of the problem; there are also substantial legal hurdles to searching and seizing computer evidence. Few courts have applied the Fourth Amendment to searches for computer evidence, which means that the law in this area remains unclear. Three chapters discuss the legal obstacles to searching and seizing computer evidence and suggest how readers can draft search warrants to surmount those obstacles. A diskette contains investigative checklists and sample search warrant language. Appended introduction to computer technology and an article on how to protect trade secrets from disclosure during a criminal prosecution, along with a sample protective order to be used for that purpose.… (mais)
Membro:concordlt
Título:High-Technology Crime: Investigating Cases Involving Computers (with 3.5 diskette)
Autores:Kenneth S Rosenblatt (Autor)
Informação:KSK Publications (1995), 603 pages
Colecções:A sua biblioteca
Avaliação:
Etiquetas:Legal

Informação Sobre a Obra

High-Technology Crime: Investigating Cases Involving Computers (with 3.5 diskette) por Kenneth S. Rosenblatt

Adicionado recentemente porbensmith, concordlt, lakkal, dean
Nenhum(a)
A carregar...

Adira ao LibraryThing para descobrir se irá gostar deste livro.

Ainda não há conversas na Discussão sobre este livro.

Sem críticas
sem críticas | adicionar uma crítica
Tem de autenticar-se para poder editar dados do Conhecimento Comum.
Para mais ajuda veja a página de ajuda do Conhecimento Comum.
Título canónico
Título original
Títulos alternativos
Data da publicação original
Pessoas/Personagens
Locais importantes
Acontecimentos importantes
Filmes relacionados
Prémios e menções honrosas
Epígrafe
Dedicatória
Primeiras palavras
Citações
Últimas palavras
Nota de desambiguação
Editores da Editora
Autores de citações elogiosas (normalmente na contracapa do livro)
Língua original
DDC/MDS canónico
Canonical LCC

Referências a esta obra em recursos externos.

Wikipédia em inglês

Nenhum(a)

This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers. The book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers; for example, the crime of breaking and entering into computers flourished after businesses began connecting computers to sophisticated telecommunications networks. High-technology crime also includes traditional crimes so transformed by computer technology that investigators handling such cases must be familiar with computers and the high-technology industry. One chapter discusses basic principles common to investigating high- technology crime, and three chapters examine the most common high-technology crimes: theft of components, computer intrusion, and theft of information. These three chapters provide readers, including those with no technical background or competence, with the necessary technical information to investigate those crimes, along with a procedure for doing so. An appendix contains a checklist for these investigations. The second part of the book examines a growing challenge facing every law enforcement agency in the United States: safely and legally obtaining evidence stored within computers. Obtaining evidence from a computer without damaging equipment or losing data is just one part of the problem; there are also substantial legal hurdles to searching and seizing computer evidence. Few courts have applied the Fourth Amendment to searches for computer evidence, which means that the law in this area remains unclear. Three chapters discuss the legal obstacles to searching and seizing computer evidence and suggest how readers can draft search warrants to surmount those obstacles. A diskette contains investigative checklists and sample search warrant language. Appended introduction to computer technology and an article on how to protect trade secrets from disclosure during a criminal prosecution, along with a sample protective order to be used for that purpose.

Não foram encontradas descrições de bibliotecas.

Descrição do livro
Resumo Haiku

Capas populares

Ligações Rápidas

Avaliação

Média: Sem avaliações.

É você?

Torne-se num Autor LibraryThing.

 

Acerca | Contacto | LibraryThing.com | Privacidade/Termos | Ajuda/Perguntas Frequentes | Blogue | Loja | APIs | TinyCat | Bibliotecas Legadas | Primeiros Críticos | Conhecimento Comum | 164,395,662 livros! | Barra de topo: Sempre visível