Designed to help police leaders adopt or modify their own volunteer programs, the book:
Framed by modern concerns for homeland security and community safety, the book places the topic in historical and international contexts. It will serve as a catalyst for the development of courses as well as growth in the number of qualified volunteer police, a necessary resource for homeland security.
A 103-page online instructional manual is available for instructors who have adopted this book. It includes model answers to each of the review questions found at the end of each chapter as well as additional student exercises and related updated references.
Martin Alan Greenberg has headed criminal justice programs at several universities, having earned his Ph.D. degree from the City University of New York and Juris Doctorate (J.D.) from New York Law School. He has worked as a senior court officer, probation officer, school security assistant, and law clerk. Dr. Greenberg was also a member the New York City Auxiliary Police Force for 12 years, obtaining the rank of auxiliary deputy inspector. His earlier books dealing with volunteer police include: Auxiliary Police: The Citizens Approach to Public Safety (1984) and Citizens Defending America: From Colonial Times to the Age of Terrorism (2005).
It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.
This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.
New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.
This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks