

Computer Crime: A Crimefighter's Handbook
By David Icove, Karl Seger & William VonStorch
Consulting Editor Eugene H. Spafford
464 pages, $29.95
This book is for anyone who needs to know what today's computer crimes
look like, how to
prevent them, and how to detect, investigate, and prosecute them if they
do occur. It contains basic
computer security information as well as guidelines for investigators, law
enforcement, and system
administrators. Also includes computer-related statutes and laws, a resource
summary, detailed
papers on computer crime, and a sample search warrant.
Terrorist attacks on computer centers, electronic fraud on international
funds transfer networks,
viruses and worms in our software, corporate espionage on business networks,
and crackers
breaking into systems on the Internet...Computer criminals are becoming
ever more technically
sophisticated, and it's an increasing challenge to keep up with their methods.
Computer Crime: A Crimefighter's Handbook is for anyone who needs to know
what today's
computer crimes look like, how to prevent them, and how to detect, investigate,
and prosecute
them if they do occur. It contains basic computer security information as
well as guidelines for
investigators, law enforcement, and computer system managers and administrators.
Part I of the book contains a discussion of computer crimes, the computer
criminal, and computer
crime laws. It describes the various categories of computer crimes and profiles
the computer
criminal (using techniques developed for the FBI and other law enforcement
agencies). Part II
outlines the the risks to computer systems and personnel, operational, physical,
and
communications measures that can be taken to prevent computer crimes. Part
III discusses how to
plan for, investigate, and prosecute computer crimes, ranging from the supplies
needed for criminal
investigation, to the detection and audit tools used in investigation, to
the presentation of evidence
to a jury.
Part IV of the book contains a compendium of the computer-related U.S. federal
statutes and all of
the statutes of the individual states, as well as representative international
laws. Part V contains a
resource summary, detailed papers on computer crime, and a sample search
warrant for a computer
crime. 464 pages, $29.95
[Order This Book]
THE COMPUTER PRIVACY HANDBOOK
A Practical Guide To E-Mail Encryption, Data Protection And PGP
Software
And The Whole Subject Of Privacy In General!
By: Andre Bacard
No other book on the market covers the whole issue of privacy, especially
high tech privacy like this one does. The author starts out with privacy
in general and how to protect it (and these first few chapters are very-very
good). The book then dives right into the subject of computer privacy and
e-mail privacy and explains why everything you e-mail or write on a computer
screen is an open book. You'll then learn about how the federal government
wants to be in a position to monitor all telecommunications. This excellent
book then dives into the subject of data encryption and the computer program
PGP (Pretty Good Privacy). Aside from just explaining what PGP is, this
book explains it indpeth in a user's manual type way and shows you where
to get it.
Mitch Kopor, co-founder of the Electronic Frontier Foundation called this
book, An Invaluable guide to the whole subject of privacy on the net, the
politics of privacy, and most important, the practical steps one can take
right now. Jim Warren, founder of Infoworld said this about this book, "Ruthlessly
realistic but optimistic book explains the privacy dangers that you face
and what you can do to protect yourself."
Don't run around the Net bare naked-get the one book everyone should read
who accesses the net. 274 pages. $24.95
[Order This Book]
READ ARTICLE BY AUTHOR
COMPUTER SECURITY BASICS
By Deborah Russell & G.T. Gangemi Sr.
1st Edition July 1991
464 pages, $35.00
Provides a broad introduction to the many areas of computer security
and a detailed description of
current security standards. This handbook describes complicated concepts
like trusted systems,
encryption, and mandatory access control in simple terms, and contains a
thorough, readable
introduction to the "Orange Book."
There's a lot more consciousness of security today, but not a lot of understanding
of what it means
and how far it should go. No one loves security, but most people---managers,
system
administrators and users alike---are starting to feel that they'd better
accept it, or at least try to
understand it.
For example, most U.S. Government equipment acquisitions now require "Orange
Book" (Trusted
Computer System Evaluation Criteria) certification. A lot of people have
a vague feeling that they
ought to know about the Orange Book, but few make the effort to track it
down and read it.
Computer Security Basics contains a more readable introduction to the Orange
Book---why it
exists, what it contains, and what the different security levels are all
about---than any other book or
government publication.
This handbook describes complicated concepts such as trusted systems, encryption,
and mandatory access control in simple terms. It tells you what you need
to know to understand the basics of computer security, and it will help
you persuade your employees to practice safe computing.
Contents include:
464 pages, $35.00
[Order This Book]
This book has become known as the final authority and bible for access
to companies that provide online information for the types of online and
offline searches private investigators need and use. It is now out in it's
third 1996 updated and expanded edition. You'll be in a position to really
expand the sources of information you tap into. Almost 500 sources of information
are reviewed and indexed, some of which have never before been in print.
Aside from the sources of information you'll learn about and be in a position
to tap into, this directory also covers reviews of prominent business and
professional associations, review of public records searching on the internet,
questions to ask a potential online vendor before you sign up, reviews of
CD-Rom products you can obtain, extensive index containing 26 different
types of information categories and much more. Large 8 1/2 X 11 pages, indexes,
charts, graphics, over 300 pages, with NAIS certificate issued in your name
if NAIS member in Online Searching Sources. $35.00
[Order This Book]

THE PRIVATE INVESTIGATOR'S GUIDE TO
THE INTERNET
How You And Your Investigative Agency Can Tap Into One Of The
Most Powerful Influences Of This Century
By Joseph Seanor
There is a major trend happening world wide today and that trend is the
Internet. The Internet is a vast information super highway paved with goldmines
of information. Vast and massive opportunities for marketing extremely inexpensively
on the information super highway. There has been many books written on the
Internet, but none of them provide a specific focus for the professional
private investigator. As you read through this book, you'll gain power in
the form of how to market your services and how to search the vast information
available on the Internet which makes many of the typical commercial databases
available today seem extremely small and unimportant. Mr. Seanor knows more
about the Internet than any other private investigator in the country and
he shares his expertise with you so you'll have investigative power and
marketing power you didn't even know existed! This is one of the most important
works to be published for the private investigative industry in this century.
If you don't yet understand what the Internet is or are already on it but
is puzzled by how to tap it's power for your investigative agency, then
this book is for you. 198 pages. $35.00
[Order This Book]
This new work is MUST reading for any private investigator wanting to
maintain a cutting edge lead right now and get prepared for the vast digital
shifts that are going to have a profound impact on not only the way we conduct
investigations but the types of cases we work. Large 8 1/2 X 11, 90 pages,
photos. $29.95
[Order This Book]
NOTE: TO SEE SOME OF THE ABRIDGED INFORMATION IN THIS BOOK CHECK:
THE NAIS LINK PAGES
THE NAIS NEWSLETTER PAGES

Bandits on the Information Superhighway
By Daniel J. Barrett
246 pages, $19.95
Most people on the Internet behave honestly, but there are always some
troublemakers. What risks
might you encounter online? And what practical steps can you take to keep
yourself safe and
happy? This book will show you:
With first-person anecdotes, technical tips, and the advice of experts from
diverse fields, Bandits
on the Information Superhighway helps you identify and avoid risks online,
so you can have a
more productive and enjoyable time on the Internet.
In the future, will we have more or less privacy online? Will scams increase
or decrease? Are new
laws on the horizon? Do we really need them? Listen as our panel of expert
users speculates on the
future of Internet banditry. $19.95
[Order This Book]

INFORMATION WARFARE
By Winn Schwartau
Information Warfare Currently Costs The US An Estimated $100 to $300 Billion
Per year Through
-Industrial Espionage- Hackers And Cyberpunks-
-Malicious Software & Viruses- Data Eavesdropping-
-Code Breaking & Chipping- Attacks On Personal Privacy-
-Binary Schizophrenia- Bombs And Magnetic Weaponry-
Computer sabotage can wipe our banks. Hackers can steal millions electronically.
Industrial espionage through computer monitoring and data eavesdropping
is costing businesses millions. Phone phreaks have already come close to
a North American phone system shutdown. From the President of the United
States To The Director of the CIA on down the line, everyone of any importance
is starting to realize that the cyberspace we have created lacks security
measures that are needed giving criminals large holes of opportunity to
crawl through. This book is about the potential holes in our information
systems and how to plug them up.
The Former Deputy Director Of The USMC Intelligence Center, robert Steel
recently called Winn Schwartau, author of this book, both the most dangerous
man in American and the most valuable. The Deputy Director also said that
the author has knowledge and insights on our nation's vulnerabilities to
Information Warfare along with solutions. This book is about both and exposes
a coming trend in the private investigative industry, how to combat information
warfare.
If you are interested in coming and booming technological opportunity in
investigation and security, then this book is for you. 432 pages. $19.95
[Order This Book]
AUTHORS WANTED If you have an investigative training manual we would like to see it for publishing consideration. Yes we want to here from you. Send your manuscript to the above address marked ATTN: Editorial Department. (No phone calls please!)
Copyright:1997 All rights reserved. Thomas Investigative Publications, Inc. Special Notice Please Read The complete contents of the NAIS Home Page is copyrighted and owned by Thomas Investigative Publications, Inc. It can not be copied nor stored in any type of electronic media without prior written consent from Thomas Investigative Publications, Inc. NAIS members are free to make copies of the NAIS membership directory for their own office use. Others are not. Copyright infringement will require action taken on our part including both criminal and civil actions.