High Technology Crime Investigator's Handbook
||Author: Gerald L. Kovacich, William C. Boni|
List Price: $39.95
Our Price: Click to see the latest and low price
Publisher: Butterworth-Heinemann (15 September, 1999)
Sales Rank: 77,394
Average Customer Rating: 4.2 out of 5
Customer ReviewsRating: 5 out of 5
Excellent insider information on attacking high-tech crime
High-tech crime remains a rapidly growing global menace. Read this book if you are interested in learning the basics of this type of crime and the professional tools and techniques used against it. Written by security professionals, federal/local government and corporate managers should read this book to understand strategies and methods needed to protect public and private resources from high-tech attacks. I especially would expect federal and local managers to be familiar with and following the principles described in this book to protect taxpayer resources - and be aware of deficiencies and taking corrective action. Other readers will gain better security awareness and the steps businesses are taking (or should be taking!) to protect user/customer resources. After reading this book, I certainly have a better understanding of the difficulties my bank and credit union, for example, are facing to protect my money.
Rating: 5 out of 5
Read this book first and save keep sanity...
Whether you're a law enforcement or corporate security professional, this book is one you should not just read but thoroughly digest before stepping off the ledge into high tech crime investigation. I've had both the satisfaction and frustration of managing investigations in both worlds over the last 16 years and have experienced, first hand, the hazards and consequences that await the uninformed. If resources such as the High Technology Crime Investigators Handbook had been available when I first began working high tech crimes in 1981, I would have gratefully traded the experience for the knowledge. The book is invaluable in educating law enforcement in the interests and philosophy of private industry as well as educating corporate security professionals in meeting the litmus tests for law enforcement involvement and successful prosecution. If you could only choose one book on high-tech crime investigations, this is it. Whether you are a private investigator, in law enforcement, corporate security, criminal justice student or just interested in the topic, this book is the book to read first, a must read.
Rating: 1 out of 5
Waste of time
After reading the reviews of the book, I was really looking forward for receiving it. However, it turned out to be a big disappointment. It may improve towards the end, but the first chapters were of so bad standard I gave up reading it.
Don't have the book here right now so I can't tell the pages, but in the first few chapters I was told that acceptable use of fire arms (authors claim IT is just like fire arms as it can be used for good and bad) is a police killing an offender that might kill someone else (ever heard of the theory of deterrence?), that phreakers (i.e. those hacking telephone systems for free calls) are the major threat for global information infrastructure security, CERT archives are the major source of information for hackers, SATAN etc. (including outdated Crack) are significant hacker tools, WWW is just a number of screens connected to each other, being given only ping attack as an example of denial of service, spent pages on calculating how many books fit into hard drives of different sizes (Assumption was that a book contains almost 1000 pages, then it was reduced 500 pages, this book is around 300 pages), and was generally being subjected to a number of unjustified claims about computer crime and computer criminals that seem to be if not all wrong, at least so simple unlikely to educate anyone to understand crime in GII.
As I said, the book may improve but I am not intending on finding out. The US centricity doesn't help, either. I'd rather get back to other sources of computer crime information that are more accurate and comprehensive.
Luckily, there are a number of good books around. For an introduction to computer crime, I recommend Icove, Seger and VonStorch: Computer Crime, A Crime Fighter's handbook (O'Reilly and Associates 1995). For a number of case studies and examples of computer crime, get Denning's Information Warfare and Security (Addison-Wesley 1999). For the scope of economical espionage and information warfare capacities of countries other than US Check Adams's The Next World War (Arrow Books Limited, 1998). To properly understand that national information infrastructure, nations' dependence on it and inherent vulnerabilities, get your hands on to Schneider's (ed.) Trust in Cyberspace (National Academy Press, 1999). If you want to know the extent of computer crime, go to CSI/FBI computer crime survey online.
It is widely assumed that law enforcement personnel is not properly educated to handling computer crime. If this is the case, authors should be especially carefull to treat security technology and vulnerabilities appropriately. Simplifications and unjustified assumptions don't help much. Therefore, it's better spend time on the above books and WWW site and get a more comprehensive picture of computer crime.
· Incident Response and Computer Forensics, Second Edition
· Digital Evidence and Computer Crime
· Handbook of Computer Crime Investigation: Forensic Tools & Technology