[prev in list] [next in list] [prev in thread] [next in thread]
List: best-of-security
Subject: Re: computer crime (fwd)
From: Julian Assange <proff () suburbia ! net>
Date: 1995-08-07 23:08:47
[Download RAW message or body]
Forwarded message:
>From debby@ora.com Tue Aug 8 00:55:38 1995
Message-Id: <199508071454.KAA26421@ruby.ora.com>
From: Deborah Russell <debby@ora.com>
Date: Mon, 7 Aug 1995 10:54:38 EDT
In-Reply-To: Julian Assange <proff@suburbia.net>
"computer crime" (Aug 6, 4:17pm)
X-Mailer: Mail User's Shell (7.2.0 10/31/90)
To: Julian Assange <proff@suburbia.net>
Subject: Re: computer crime
On Aug 6, 4:17pm, Julian Assange wrote:
} Subject: computer crime
}
} Can you give me some more details of this book you are working on with
} spaf?
}
Here's some info from a marketing report (excuse the tagging,
but I don't have the final report available to me here). The
actual book will be available 8/15.
Deborah Russell
<TITLE>
Computer Crime
<SUBTITLE>
A Crimefighter's Handbook
<AUTHOR.NAMES>
By David Icove, Karl Seger & William VonStorch
(Consulting Editor Eugene H. Spafford)
<EDITION>
1st Edition August 1995
<PAGES>
500 pages
<ISBN>
1-56592-086-4
<EAN>
<PRICE>
$24.95 (est.)
<TRIMSIZE>
7 X 9 3/16
<LONG.MKTG>
Terrorist attacks on computer centers, electronic fraud on
international funds transfer networks, viruses and worms in our
software, corporate espionage on business networks,
and crackers breaking into systems on the Internet...Computer
criminals are becoming ever more technically sophisticated, and it's an
increasing challenge to keep up with their methods.
<I>Computer Crime: A Crimefighter's Handbook</I>
is for anyone who needs to know what today's computer crimes
look like, how to prevent them, and how to detect, investigate, and
prosecute them if they do occur. It contains basic computer security
information as well as guidelines for investigators,
law enforcement, and computer system managers and administrators.
Part I of the book contains a discussion of computer crimes, the
computer criminal, and computer crime laws. It describes
the various categories of computer crimes and profiles the computer
criminal (using techniques developed for the FBI and other law
enforcement agencies). Part II outlines the the risks to computer
systems and personnel, operational, physical, and communications measures
that can be taken to prevent computer crimes. Part III discusses how to
plan for, investigate, and prosecute computer crimes, ranging from the
supplies needed for criminal investigation, to the detection and audit
tools used in investigation, to the presentation of evidence to a jury.
Part IV of the book contains a compendium of the computer-related
U.S. federal statutes and all of the statutes of the individual
states, as well as representative international laws..
Part V contains a resource summary, detailed papers on computer
crime, and a sample search warrant for a computer crime..
<SALES.POINTS>
<LI>This book originated as an FBI training manual and has the
benefit of FBI experience (though it has been thoroughly
rewritten for publication). It also has been reviewed by
representatives of the U.S. Secret Service, the Department of
Justice, local police departments, district attorney's
offices, and law enforcement abroad.
**
<LI>Contains a complete listing of U.S. federal, state, and
representative international laws concerning computer crime.
<LI>Contains a great deal of general computer security
information, introductory enough to give investigators and law
enforcement professionals a grounding in terms and concepts,
but technical enough to be useful by computer system managers
and administrators.
<AUDIENCE>
Law enforcement, other computer crime investigators, and anyone interested
in computer security and the prevention of computer crime. Of particular
interest to managers, investigators, legal staff, and system administrators
charged with preventing and handling computer crimes. Useful
to anyone interested in computer crime laws and recent trends
in law enforcement in cyberspace.
<QUOTES>
"This is more than a handbook for investigators in tracking down computer
crime--it also tells you how to respond to threats and ways to avoid
problems. This book shows where computing meets law enforcement."
-- Cliff Stoll, author of The Cuckoo's Egg and Silicon Snake Oil
"This book provides an excellent primer for both the network security
professional and the criminal investigator...The authors assisted
in the successful conclusion of several federal investigations."
-- James C. Settle, I-NET and former FBI agent
"...a very helpful and interesting book. I'm going to make sure all of the
Secret Service new Electronic Crimes Special Agents get a copy to assist
them."
-- Bob Friel, Financial Crimes Division, Electronic Crime Branch,
U.S. Secret Service
"This is an excellent and worthwhile handbook for both the novice and
experienced computer crime investigator. I will recommend it to my computer
crime classes."
-- Detective Robert M. Snyder, Intelligence Bureau, Computer Crime
Unit, Columbus Ohio Police Department
"Any organization that is worried about attacks on their computer
systems, especially those attached to the Internet, should run to
the bookstore to pick up a copy of Computer Crime. It's one-stop
shopping for system administrators and law enforcers, with plenty
of pointers to additional resources if needed."
-- Lance J. Hoffman, Director, Institute for Computer
and Telecommunications Systems Policy, School
of Engineering, The George Washington University
<AUTHOR.BIO>
David J. Icove is a nineteen-year career law enforcement officer
who is presently
employed by the Tennessee Valley Authority (TVA) Police-Public Safety
Service, Risk and Emergency Management Division. Prior to coming to TVA in
1993, he served nine years as an instructor in the Behavioral Science Unit at
the FBI Academy in Quantico, Virginia. A coauthor of several textbooks on
law enforcement and security-related subjects, Dr.Icove holds BS and MS
degrees in Electrical Engineering and a Ph.D in Engineering Science and
Mechanics from the University of Tennessee, and a BS in Fire Protection
Engineering from the University of Maryland. He is a registered Professional
Engineer in the States of Tennessee and Virginia.
Dr. Karl A. Seger is an Organizational Psychologist and President
of Associated Corporate Consultants, Inc., a firm he founded in
1973. He has provided security consulting services across the
United States, Central America and in Europe to multinational
corporations, all branches of the U.S. military, the Department
of Justice (FBI), the Department of the Treasury, and the
Department of Energy. He conducts computer crime and security
courses in the U.S. and in Germany and serves as the computer
security instructor for the American Society for Industrial
Security Assets Protection II Course. Dr. Seger is also the author
of the <I>Antiterrorism Handbook</I> (Presidio Press, 1990).
William R. VonStorch is currently the head of the Foreign
Counterintelligence Automated Data Processing Operations for the Naval
Criminal Investigative Service. He has served more than 20 years in
the United States Navy and Naval Reserves, specializing in areas of
military intelligence and physical and personnel security. During the
last 12 years his experience has been in the areas of
counterintelligence, law enforcement, anti-terrorism, computer
systems, and computer security. Bill also owns and operates a
part-time computer consulting firm that specializes in various types
of information management service. He do-developed the
Computer-Assisted Security and Investigation Analysis Tool for use by
the FBI to maintain information on malicious software,
security-related incident information, critical elements of federal
legislation, and vulnerabilities of computer systems, hardware, and
software. He resides in Maryland.
Eugene H. Spafford is on the faculty of the Department of Computer Sciences
at Purdue University. He is the founder and director of the Computer
Operations, Audit, and Security Technology (COAST) Laboratory at
Purdue, and is also associated with the Software
Engineering Research Center (SERC) there. Professor Spafford is an active
researcher in the areas of software testing and debugging, applied
security, and professional computing issues.
He was a participant in the effort to bring the
Internet worm under control; his published analyses of that incident
are considered the definitive explanations. He is the coauthor of
<I>Practical
UNIX Security (O'Reilly & Associates, second edition, 1995)</I>, and
has also coauthored a
widely-praised book on computer viruses. He supervised the development
of the first COPS and Tripwire security audit software packages,
and he has been a frequently-invited speaker at computer ethics and
computer security events around the world.
He is on numerous editorial and advisory
boards, and is active in many professional societies, including ACM,
Usenix, IEEE (as a Senior Member), and the IEEE Computer Society.
He is involved with several working groups with IFIP Technical
Committee 11 on Security and Protection in Information Processing Systems.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic