Demon Dialer Model 27 Bedienungsanleitung Seite 2

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 12
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 1
146 INDEX
Burden of proof, 58
Business records exception to hearsay
rule, 136, 137
Bytes and memory blocks, 42, 43
C, 6
C+, 3
C++, 3, 6
Cache files, 114, 124, 125
Card skimming, 90, 91
Carnivore software (FBI), 80, 141, 142
Carving, 121, 122
CD (compact disc) as storage unit, 16
Cellular phones as storage unit, 16
Central processing unit (CPU), 15, 17
Chain of custody, 119, 134, 135
Chat rooms, 95, 96, 101, 102
Child endangerment, 94, 96
Child pornography cases, 41, 9497, 114
Circumstantial evidence, 128, 129
Civil litigation, 5863
Clusters, 45, 46, 121
COBOL, 3
Code, 22
Collection of evidence
procedure, 3137
record keeping, 30
Color, 20, 21
Compact disc (CD) as storage unit, 16
Complaints, 59
Computer crimes, 66, 88, 89. See also
Criminal liability
auction fraud, 9799
child pornography and child
endangerment, 9497
counterfeiting, 100
cyberstalking, 102
forgery, 100
identity theft, 8994
online retail fraud, 99
piracy, 103105
prostitution, 100, 101
securities fraud, 101, 102
Computer data described, 1723
Computer Fraud and Abuse Act, 76
Computer literacy, 70
Computers
basic operation of, 1424
historical background, 35
ubiquitous nature of, 14
Conclusion of report, 56
Control/Program Monitor (CP/M), 6
Copying
and file slack, 34, 35, 42, 43
imagers. See Imagers
importance of copying data drive, 42
software, 84
Copyright infringement, 104
Corporate espionage, 79, 80, 82
Counterfeiting, 89, 100
CPU (central processing unit), 15, 17
Credit cards, forgery and fraud, 9092
Criminal liability. See also Computer
crimes
arrest and arraignment, 60
burden of proof, 58
civil litigation distinguished, 58
expert witnesses, use of, 61
historical background, 9, 10
information or indictment, 59
offense as start of case, 58
penalties, 60
plea agreements, 62
trials, 62, 63
Cross-examination, 135, 136
Cryptanalysis, 82, 83, 123
Cryptography, 46, 80. See also Encryption
Cult of the Dead Cow, 68
Curricula vitae (CV), investigator’s, 56
Cyberstalking, 102
Cyberterrorists, 70, 71, 85
Data retrieval from dead system, 116118,
120122
Daubert v. Merrill Dow
Pharmaceuticals, 64, 131, 132
Defendants, 59
Defragmentation, 44
Deleted files, 43, 44, 121, 122
Demon Dialer, 68
Demonstrative evidence, 129
Department of Defense (DOD)
and growth of Internet, 4
vulnerabilities, 70, 71
Depositions, 6062
Diagnostic software, 123
Digital evidence, 1
collection of, 13
Seitenansicht 1
1 2 3 4 5 6 7 ... 11 12

Kommentare zu diesen Handbüchern

Keine Kommentare