<< 1 >>
Rating:  Summary: Waste of time Review: After reading the reviews of the book, I was really looking forward for receiving it. However, it turned out to be a big disappointment. It may improve towards the end, but the first chapters were of so bad standard I gave up reading it.Don't have the book here right now so I can't tell the pages, but in the first few chapters I was told that acceptable use of fire arms (authors claim IT is just like fire arms as it can be used for good and bad) is a police killing an offender that might kill someone else (ever heard of the theory of deterrence?), that phreakers (i.e. those hacking telephone systems for free calls) are the major threat for global information infrastructure security, CERT archives are the major source of information for hackers, SATAN etc. (including outdated Crack) are significant hacker tools, WWW is just a number of screens connected to each other, being given only ping attack as an example of denial of service, spent pages on calculating how many books fit into hard drives of different sizes (Assumption was that a book contains almost 1000 pages, then it was reduced 500 pages, this book is around 300 pages), and was generally being subjected to a number of unjustified claims about computer crime and computer criminals that seem to be if not all wrong, at least so simple unlikely to educate anyone to understand crime in GII. As I said, the book may improve but I am not intending on finding out. The US centricity doesn't help, either. I'd rather get back to other sources of computer crime information that are more accurate and comprehensive. Luckily, there are a number of good books around. For an introduction to computer crime, I recommend Icove, Seger and VonStorch: Computer Crime, A Crime Fighter's handbook (O'Reilly and Associates 1995). For a number of case studies and examples of computer crime, get Denning's Information Warfare and Security (Addison-Wesley 1999). For the scope of economical espionage and information warfare capacities of countries other than US Check Adams's The Next World War (Arrow Books Limited, 1998). To properly understand that national information infrastructure, nations' dependence on it and inherent vulnerabilities, get your hands on to Schneider's (ed.) Trust in Cyberspace (National Academy Press, 1999). If you want to know the extent of computer crime, go to CSI/FBI computer crime survey online. It is widely assumed that law enforcement personnel is not properly educated to handling computer crime. If this is the case, authors should be especially carefull to treat security technology and vulnerabilities appropriately. Simplifications and unjustified assumptions don't help much. Therefore, it's better spend time on the above books and WWW site and get a more comprehensive picture of computer crime.
Rating:  Summary: Excellent insider information on attacking high-tech crime Review: High-tech crime remains a rapidly growing global menace. Read this book if you are interested in learning the basics of this type of crime and the professional tools and techniques used against it. Written by security professionals, federal/local government and corporate managers should read this book to understand strategies and methods needed to protect public and private resources from high-tech attacks. I especially would expect federal and local managers to be familiar with and following the principles described in this book to protect taxpayer resources - and be aware of deficiencies and taking corrective action. Other readers will gain better security awareness and the steps businesses are taking (or should be taking!) to protect user/customer resources. After reading this book, I certainly have a better understanding of the difficulties my bank and credit union, for example, are facing to protect my money.
Rating:  Summary: Excellent insider information on attacking high-tech crime Review: High-tech crime remains a rapidly growing global menace. Read this book if you are interested in learning the basics of this type of crime and the professional tools and techniques used against it. Written by security professionals, federal/local government and corporate managers should read this book to understand strategies and methods needed to protect public and private resources from high-tech attacks. I especially would expect federal and local managers to be familiar with and following the principles described in this book to protect taxpayer resources - and be aware of deficiencies and taking corrective action. Other readers will gain better security awareness and the steps businesses are taking (or should be taking!) to protect user/customer resources. After reading this book, I certainly have a better understanding of the difficulties my bank and credit union, for example, are facing to protect my money.
Rating:  Summary: It is a must Review: If you are wanting to learning the principles of investing computer crime then this book is a must.
Rating:  Summary: A Non-Technical Look at High-Tech Crime and Investigations Review: This books is not just about conducting high-technology crime investigations.It is much more than that. This book is intended for anyone interested in the topic of high-technology crime. However, when writing it, we had business and government managers in mind; as well as the private and government investigators, law enforcement as well as information security professionals.We wrote this book to provide a non-technical guide, an overview, of the topic of high-technology crime, what professionals in the criminal justice system around the globe are doing, their investigations; as well as how to establish and manage a high-tech crime investigative unit. We also included some career development guidance and suggestions for making this field a separate profession similar to the profession of computer security that has grown primarily out of the IT profession. It is also recommended reading for those government and business managers who are responsible for protecting the assets of their government agency or business. They must understand high-technology crime. After all, they are spending literally billions of dollars on high-technology security hardware and software. Why? To protect them from the miscreants who want to steal, misappropriate and fraudulently acquire those assets. We have also offered an example of some techniques that can be used in developing an aggressive anti-high-technology crime program. After all, it's cheaper to prevent the crime than to investigate it and fix the process after the losses have occurred. It is the most cost-effective approach. We hope you enjoy reading this book.
Rating:  Summary: Great perspective on high-tech crimes. Review: What a practical and informative book. It's about time a book has been written that is not interwoven with conjecture and idealistic gibberish. This book has substance and is very relevant to the real world of crime in the technological environment. The authors' ability to provide such a broad perspective about the subject in such an understandable fashion is appreciated and refreshing. The authors provide a precise overview of the entire high-technology crime investigatory process. This book not only deals with a myriad of important issues but also offers viable solutions and prevention programs which have already been tested. It contains information that is applicable, not only to security professionals, but to law enforcement as well. Let's face it, "high-tech" crime will undoubtedly flourish in the next century. Managers and investigators from law enforcement and industry must have - at least - a basic understanding of the implications of this type of crime and the global information environment before they can effectively react to it. Protecting the assets of the public and private sectors will become higher priorities because the stakes are becoming higher and thieves will continually attempt to take advantage of new and existing technology to commit their crimes. As we move into the next century, the challenge will be to understand and aggressively respond to high-technology crime.
Rating:  Summary: Read this book first and save keep sanity... Review: Whether you're a law enforcement or corporate security professional, this book is one you should not just read but thoroughly digest before stepping off the ledge into high tech crime investigation. I've had both the satisfaction and frustration of managing investigations in both worlds over the last 16 years and have experienced, first hand, the hazards and consequences that await the uninformed. If resources such as the High Technology Crime Investigators Handbook had been available when I first began working high tech crimes in 1981, I would have gratefully traded the experience for the knowledge. The book is invaluable in educating law enforcement in the interests and philosophy of private industry as well as educating corporate security professionals in meeting the litmus tests for law enforcement involvement and successful prosecution. If you could only choose one book on high-tech crime investigations, this is it. Whether you are a private investigator, in law enforcement, corporate security, criminal justice student or just interested in the topic, this book is the book to read first, a must read.
Rating:  Summary: Read this book first and save keep sanity... Review: Whether you're a law enforcement or corporate security professional, this book is one you should not just read but thoroughly digest before stepping off the ledge into high tech crime investigation. I've had both the satisfaction and frustration of managing investigations in both worlds over the last 16 years and have experienced, first hand, the hazards and consequences that await the uninformed. If resources such as the High Technology Crime Investigators Handbook had been available when I first began working high tech crimes in 1981, I would have gratefully traded the experience for the knowledge. The book is invaluable in educating law enforcement in the interests and philosophy of private industry as well as educating corporate security professionals in meeting the litmus tests for law enforcement involvement and successful prosecution. If you could only choose one book on high-tech crime investigations, this is it. Whether you are a private investigator, in law enforcement, corporate security, criminal justice student or just interested in the topic, this book is the book to read first, a must read.
<< 1 >>
|