Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims
暂无分享,去创建一个
A Message to Investigators. Acknowledgments. Foreword. Chapter 1. "Real World" Cases: Solved And Unsolved. Chapter 2. Know The Crime And Understand The Criminal. Chapter 3. Computer Security For Identity Fraud Investigations. Chapter 4. Configuring The Computer And Introduction To Cyber-Searching. Chapter 5. Understand The Victim: Then Prepare For The Investigation. Chapter 6. Authenticate Then Investigate. Chapter 7. Identity Fraud Investigation: A Case Example. Chapter 8. A Walk Through The World Wide Web. Chapter 9. Tracing IP Addresses And URLs Across The WWW. Chapter 10. Tracing E-mail Addresses. Chapter 11. searching and Seizing: The Investigator's Role. Appendix: List of Web Sites for Identity Theft Searches. Notes. Index.
[1] Thomas J. Stickrath,et al. Ohio Department of Rehabilitation and Correction , 1997 .
[2] H. Marshall Jarrett,et al. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations , 1979 .
[3] J. L. Harrison,et al. The Government Printing Office , 1968, American Journal of Pharmaceutical Education.