Computer Crime: A Crimefighter’s Handbook

Product Description
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet…Computer criminals are becoming ever more technically sophisticated, and it’s an increasing challenge to keep up with their methods. Computer Crime: A Crimefighter’s Handbook is for anyone who needs to know what today’s computer crimes… More >>

Computer Crime: A Crimefighter’s Handbook

4 replies
  1. Shane Bruce says:

    Knew the author, used to work at the same place. Nice enough guy, he used to be F.B.I. and T.V.A. (Tennessee Valley Authority for you uninformed (wink)) recently Dave has been lecturing the Arson Circuit [so he’s “putting out fires “like the rest of us computer geeks”] The part he’s written of the books is a bit radical, mostly buzzwords, bits of history and I think a mistaken misnomer towards policy (if you ask this half if its an offense and can we prosecute you’ll get a false positive) but might provide some insite from the thinking of the early 80’s when “Hackers” were M.I.T. geniouses so they had to invent some other groups as the scarecrow (see description above), but then again Dave has worked the field so is an interesting perspective but it reads like a “grant supported conference” of course I think if he’d just written a novel/narrative/autobiography it would be more than the $0.02 i’m getting on reselling O’Reilly books (they usually really are good btw, most Oreilly texts were a nessesity for computer administrators (Icove’s book is not one though, (unless your either in the biz or a crazed enthusist)) [one quote is “all people have committed offenses, and other people ultimatly detect them”. p 35, throw the first stone attitude, everyone else has, so philosophy major he ain’t”, but probably what is known as the “Other Half” of the book is legal statutes (“laws used to prosecute computer crime” p73 so again this is actually written as the lowest go ahead denominator (invade first, then look up the law afterward) that possibly an agent would like (and the author [whether David Icove or not] attempted) to give to his or herself, but back to the legal part) (this is the part one pores over for years looking for either actual go-ahead or a loophole). O.K. got that straight 1st half addresses “order”, 2nd half addresses “Law”, reverse it (Law before Order, lest we all be animals [i’m just speaking here as a techocrate]) and you got what I call normalicy. Would have rated it higher, but always look up the law on a current database, as the House like to date it. (only reason it got a two is the buzzwords might have been actually used back in the day)
    Rating: 2 / 5

  2. Peter Timusk says:

    This is an example of a gift of white space that is used to sell computer literature and software. But also there’s tricks and techniques from the FBI in this white space book. Maybe you can go out and bust a computer user or want too. This book will show you how.

    It took me about five months to read. But then again it could be a faster read if your focused only on one book.

    Very complete but needs more Canadian law references.
    Rating: 4 / 5

  3. Anonymous says:

    Well, this book is an exelent scource for computer crime and law, but it sarts off with a bit of easy stuff. I suppose that is needed for some. :-) Nice job again orilley!
    Rating: 4 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.