Computer Crime



AJALogo3D


Manuals and Textual Information Regarding Computer Crime
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
Computer Crime Investigation and Forensics
Computer Crime Investigations in the United States
Investigating and Prosecuting Cyber Crime
Computer Crime: A Joint Report
Why the Police Don’t Care About Computer Crime
Combating Cyber Crime
Cyber Crime Checklistfor Police Chiefs
Computer Crime: Expert Witness Manual

Video Presentations Regarding Computer Crime Investigations
Computer Forensic Investigation Process
Evidence Analysis and Handling
Common Network Attacks and Countermeasures
IDS – Intrusion Detection Systems
Firewalls and Perimeter Security
Network Communications – Network Access Control
Wireless Networks
Secure Communication Protocols
WAN Connection Technologies
Converged Protocols and Multimedia Collaboration
Remote Access Security
Switching Technologies
Endpoint Security
Mobile Systems Threats and Vulnerabilities
WLAN Authentication
IP Networking
Ethernet Address Resolution Protocol
Multi-layer Protocols
DNS and DHCP
Network Devices
TCP/IP Model
OSI Layers
OSI Protocols
Signaling Types
Network Cabling and Topology