Investigating Internet Crimes

Investigating Internet Crimes, 1st Edition

An Introduction to Solving Crimes in Cyberspace

Investigating Internet Crimes, 1st Edition,ISBN9780124078178





235 X 191

Written by experts on the frontlines, this book provides both seasoned and new investigators with the background and tools they need to get the job done.

Print Book + eBook

USD 59.94
USD 99.90

Buy both together and save 40%

Print Book


In Stock

Estimated Delivery Time
USD 49.95

eBook Overview

DRM-free included formats : EPUB, Mobi (for Kindle), PDF

VST (VitalSource Bookshelf) format

USD 49.95
Add to Cart

Key Features

  • Provides step-by-step instructions on how to investigate crimes online
  • Covers how new software tools can assist in online investigations
  • Discusses how to track down, interpret, and understand online electronic evidence to benefit investigations
  • Details guidelines for collecting and documenting online evidence that can be presented in court


Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.

Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.

Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.


Digital investigators, law enforcement personnel, private investigators, DoD, intelligence agencies and attorneys

Investigating Internet Crimes, 1st Edition


Chapter 1 Introduction to Internet Crime

Chapter 2 Internet Criminals

Chapter 3 How the Internet Works

Chapter 4 Collecting Legally Defensible Online Evidence

Chapter 5 Documenting Online Evidence

Chapter 6 Using Online Investigative Tools

Chapter 7 Online Digital Officer Safety

Chapter 8 Tracing IP Addresses Through the Internet

Chapter 9 Working Unseen on the Internet

Chapter 10 Covert Operations on the Internet

Chapter 11 Conducting Reactive and Proactive Internet Investigations

Chapter 12 Internet Resources for Locating Evidence

Chapter 13 Investigating Websites and Webpages

Chapter 14 Investigating Social Networking Sites

Chapter 15 Investigating Methods of Communication

Chapter 16 Detection and Prevention of Internet Crimes

Chapter 17 Putting it all together

Chapter 18 Conclusion

Appendices and Resources

Quotes and reviews

"Both authors and technical editor Nick Selby have decades of law enforcement and real-world experience, so the book is authoritative and practical. For those needing a guide to get them up to speed on the topic, Investigating Internet Crimes is a great place to start."--Security Management, Investigating Internet Crimes

"...a basic book for the beginner in cybercrime investigation, and it is well written, with many references...a good textbook and can be used as a reference."--Journal of Forensic Sciences, November 2014

"This book is written by two authors with extensive, real-world experience in the field, and it shows. Anyone who has felt the need to trace the origins of an attack - police officer, network specialist or individual - will find this an invaluable manual."--Network Security ,January 1 2014

Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy

Contact Us