Sunday, January 4, 2009

Digital Evidence and Computer Crime or Algorithm Design

Digital Evidence and Computer Crime

Author: Eoghan Casey

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked,
collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime.
This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.
Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about:
* Components of computer networks
* Use of computer networks in an investigation
* Abuse of computer networks
* Privacy and security issues on computer networks
* The law asit applies to computer networks

* Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence
* Offers readers information about relevant legal issues
* Features coverage of the abuse of computer networks and privacy and security issues on computer networks
* Free unlimited access to author's Web site which includes numerous and frequently updated case examples



Interesting textbook: Matching Supply with Demand or Oral Presentations for Technical Communication

Algorithm Design

Author: Jon Kleinberg

Algorithm Design introduces algorithms by looking at the real-world problems that motivate them. The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the role of algorithms in the broader field of computer science.



Table of Contents:
1Introduction : some representative problems1
2Basics of algorithm analysis29
3Graphs73
4Greedy algorithms115
5Divide and conquer209
6Dynamic programming251
7Network flow337
8NP and computational intractability451
9PSPACE : a class of problems beyond NP531
10Extending the limits of tractability553
11Approximation algorithms599
12Local search661
13Randomized algorithms707
Epilogue : algorithms that run forever795

No comments:

Post a Comment