Rating:  Summary: Great resource Review: As a former police officer, I can say without a doubt that Shinder's book is a terrific resource for both law enforcement officers and those who want to become more familiar with a growing criminal industry: cybercrime. I found the book easy to read, interesting and dead on in its accuracy. For those who want to take their expertise to the next level, this book is a must. For those who only want to famliarize themselves with the things cybercriminals know, this is a step ahead. Recommended without reservation.
Rating:  Summary: The Number One Computer Security Primer Review: Here is a book for anyone who needs a broad and accurate knowledge of computer security. This book reminds me very much of "Secrets and Lies : Digital Security in a Networked World", with one major difference -- "Scene of the Cybercrime" is written by one of the truly gifted communicators in the computer network security field. Deb Shinder communicates in a clear, precise and objective way that is completely unique. Most computer security books are "blah blah and I did this, and blah hackers, and blah Microsoft is bad, and "waving hands" blah blah." NOT this book. All computer security authors have biases, all except Deb Shinder. The book is about the facts. Clear, clean, crisp facts. Facts you can use on the job, on the beat, and "on deck" in front of the bench. This book is almost like "Secrets and Lies" except that "Scene of the Cybercrime" is written by a world class communicator in plain and relevant English. It reads like a detective story. This book raises the bar on network security books so high that its unlikely another will ever surpass it.
Rating:  Summary: Generic Information Security reading. Review: Hi, This book covers all aspects of information security but the title of the book is kind of misleading as the book only has 2 chapters that talk about anything close to Forensics. Would recommend this book to someone who is new to Information security . This ones certainly not a Forensics book .
Rating:  Summary: the nexus of computers and crime Review: i believe that this book is the most helpful of its kind for introducing the literate reader to computer crime. it is not so technical as to lose one in a swamp of argot. it provides a broad range of information, is current, offers concrete examples, and well repays the time spent reading it. my college has adopted it for our course "introduction to computer crime." [i did not participate in that review process]
Rating:  Summary: Can't Believe this is a computer book Review: I usually don't write reviews on computer books because I fall asleep before getting halfway through them. They always seem to be written by people who have no idea what they're talking about, or they're written by computer geniuses who speak some sort of extraterrestrial language. This book is different. I actually stayed awake for all of this book! This book is a great overview of computer network security, and corrects so many of the errors I've read in the more "in depth" computer security and cybercrime books. I've found this book invaluable in my prosecution of computer crimes cases.
Rating:  Summary: Great resource for cops and "regular people" Review: I'm a former law enforcement officer who is just getting into computers and technology. I found this book to be a great resource. It explains a lot of concepts that police offiers hear a lot about, but don't really understand. It's written in language "regular people" can understand, not just nerds. I learned about things I didn't know existed, like the places on hard drives where data can be recovered even after it's formatted. The book is not a "how to" for any particular forensics software, but it's pretty obvious that wasn't the intent. The author provides information about what can be done and the products used to do it, and lots and lots of pointers to web sites and resources for finding specific information. I recommend it to police officers and to regular people like my wife who thought it was fascinating, especially the part about the people involved in cybercrime.
Rating:  Summary: So very good on so many levels... Review: I'm currently in the middle of the book Scene Of The Cybercrime by Debra Littlejohn Shinder, but I decided to do a review right now. This is a really good book on a number of levels... Most books on computer and network security are written for the techie trying to secure their assets from outside attack. Obviously, there's a huge need for that information. But it seems that there is virtually nothing written from the law enforcement perspective on computer security. That's a major problem in two ways... For one, there are too few law enforcement personnel that understand exactly what cybercrime is and how it can be detected, fought, and prosecuted. That's probably the audience that would benefit most from this book. Second, most technical personnel don't know what to do in order to successfully build a case and prosecute an attacker once an intrusion has occurred. That's the other audience that will gain the most from reading Shinder's work. The book includes the following chapters: Facing the Cybercrime Problem Head On; Reviewing the History of Cybercrime; Understanding the People on the Scene; Understanding Computer Basics; Understanding Network Basics; Understanding Network Intrusions and Attacks; Understanding Cybercrime Prevention; Implementing System Security; Implementing Cybercrime Detection Techniques; Collecting and Preserving Digital Evidence; Building the Cybercrime Case The hardcore network security administrator will probably already know most of the information in the "Understanding..." chapters. But unless they are adept or experienced in forensic analysis, the last three chapters will be crucial information for them. Without the knowledge of how to preserve evidence, there's a good chance that you'll never have the satisfaction of seeing your attacker prosecuted. Higher level managers of a corporate security department will find all of this information useful, as they may not be as hands-on as the administrators and may not understand what threats and risks are present in today's environment. From the law enforcement perspective, it's all good. Fighting cybercrime is so different than regular law enforcement. This is the perfect volume to give the budding cybercop all the information they need to get up to speed with how crime is conducted electronically. I would recommend that this book be required reading for law enforcement and prosecution personnel. The book is well written with plenty of real-life examples of criminal activities and legal scenarios. It's one of the most engrossing technical reads I've had in awhile. A definite recommended read...
Rating:  Summary: So very good on so many levels... Review: I'm currently in the middle of the book Scene Of The Cybercrime by Debra Littlejohn Shinder, but I decided to do a review right now. This is a really good book on a number of levels... Most books on computer and network security are written for the techie trying to secure their assets from outside attack. Obviously, there's a huge need for that information. But it seems that there is virtually nothing written from the law enforcement perspective on computer security. That's a major problem in two ways... For one, there are too few law enforcement personnel that understand exactly what cybercrime is and how it can be detected, fought, and prosecuted. That's probably the audience that would benefit most from this book. Second, most technical personnel don't know what to do in order to successfully build a case and prosecute an attacker once an intrusion has occurred. That's the other audience that will gain the most from reading Shinder's work. The book includes the following chapters: Facing the Cybercrime Problem Head On; Reviewing the History of Cybercrime; Understanding the People on the Scene; Understanding Computer Basics; Understanding Network Basics; Understanding Network Intrusions and Attacks; Understanding Cybercrime Prevention; Implementing System Security; Implementing Cybercrime Detection Techniques; Collecting and Preserving Digital Evidence; Building the Cybercrime Case The hardcore network security administrator will probably already know most of the information in the "Understanding..." chapters. But unless they are adept or experienced in forensic analysis, the last three chapters will be crucial information for them. Without the knowledge of how to preserve evidence, there's a good chance that you'll never have the satisfaction of seeing your attacker prosecuted. Higher level managers of a corporate security department will find all of this information useful, as they may not be as hands-on as the administrators and may not understand what threats and risks are present in today's environment. From the law enforcement perspective, it's all good. Fighting cybercrime is so different than regular law enforcement. This is the perfect volume to give the budding cybercop all the information they need to get up to speed with how crime is conducted electronically. I would recommend that this book be required reading for law enforcement and prosecution personnel. The book is well written with plenty of real-life examples of criminal activities and legal scenarios. It's one of the most engrossing technical reads I've had in awhile. A definite recommended read...
Rating:  Summary: Generic Information Security reading. Review: If you're looking for a clear explanation of computer crime, and how to prevent, investigate and prosecute it, there's no better place to start than this book. It isn't a bleeding-edge technical manual for IT professionals looking for new ways to secure their systems, nor is it a technical investigation manual for law enforcement personnel. Instead, the book delivers exactly what it claims to - an excellent introduction to and overview of the subject of computer crime, with an emphasis on helping IT and law enforcement professionals understand one another's priorities, capabilities and needs. There is enough technical information, however, to make it worthwhile for those who already have some experience in this area. As a cop and police instructor with a background in the IT field, I have read a number of books in this subject area. This one tops the field. It's not perfect (thus 4 stars, not 5), but it's certainly the best that I've found yet. It's well worth investing in for both information security and law enforcement personnel. In fact, I've ordered extra copies as Christmas gifts for friends who are in the business.
Rating:  Summary: An Excellent Introduction to Computer Crime Review: If you're looking for a clear explanation of computer crime, and how to prevent, investigate and prosecute it, there's no better place to start than this book. It isn't a bleeding-edge technical manual for IT professionals looking for new ways to secure their systems, nor is it a technical investigation manual for law enforcement personnel. Instead, the book delivers exactly what it claims to - an excellent introduction to and overview of the subject of computer crime, with an emphasis on helping IT and law enforcement professionals understand one another's priorities, capabilities and needs. There is enough technical information, however, to make it worthwhile for those who already have some experience in this area. As a cop and police instructor with a background in the IT field, I have read a number of books in this subject area. This one tops the field. It's not perfect (thus 4 stars, not 5), but it's certainly the best that I've found yet. It's well worth investing in for both information security and law enforcement personnel. In fact, I've ordered extra copies as Christmas gifts for friends who are in the business.
|