- Provides an overview of the techniques experts in the field of computer crime need in the investigative process of criminal behavior
- Includes coverage of the investigative process, the legal aspects of evidence, applicable laws, behavioral profiling (ideographic and nomothetic)
- Allows readers to develop and apply criminological theories to the digital world, with a sociological slant
Table of Contents
1. Introduction to Digital Evidence and Computer Crime2. History of Computer Crimes and Investigations
3. Terminology and Tools of Digital Investigations
4. The Investigation Process
5. Introduction to Evidentiary Procedure
6. Qualities of Evidence
7. Introduction to Behavioral Profiling
8. Ideographic Digital Profiles
9. Computer Criminal Archetypes
10. Criminological Theories and Computer Crime
Authors
Johnson, Chad R. Mr. Johnson holds a BS in Political Science (Law and Legal Systems), a BS in Social Scienceand an MS in Criminology (Cybercrime and Cyber Ethics). He's currently the Information Security Officer at the University of Wisconsin in Stevens Point. He is also an Associate Lecturer in the Sociology and Computing & New Media Departments, as well as a Professor of Digital Forensics. Mr. Johnson has 15+ years' experience in Information Assurance and Information Security, is a former private investigator, specializing in cyber-intelligence and digital profiling.

