| SEMINAR BOOK CONTENTS REVIEW
COMPUTER AND INTERNET BASICS
Computer 101, Account Security, Encryption, Connecting To The Web, Email Basics, Usenet Basics, Hacker Usenet Groups, Internet Tools, FTP, Finger, Archie, WhoIs, NS Lookup, Private-eye, Web Browser Basics, Web Pages To Check, Web Sites For Investigators
SEARCHING ON THE INTERNET
How To Search The Web, Multi-Searches
Finding People On The Web, Searching Usenet On The Web
The PI Mall, Paid Databases To Consider
COMPUTER CRIME INVESTIGATION
AND COMPUTER SECURITY
Computer Crime Statistics, Tapes Of Computer Crime
Cracking, Cracking Examples, Virus Attacks, Online Stalking, Data Theft, Data Destruction, Physical Computer Theft Laptop Protection, Software Piracy, Corporate Protection The Computer Underground, Hackers, Crackers, Carding, Phone Phreak, Pirates, Warez, Social Engineering, Trojan Horses, Computer Viruses, Phishing, Computer Crime Evidence Gathering, Computer Attacks, Packet Sniffing, Mail Bombs, Fake Email, Sniffing, Computer Systems-Brands, Tempest, PC PI Network, Anti-Virus Network, How To Scan A Computer, Erased Files, Backup Systems, Backup Hardware, Backup Software,
Anti-Virus Checklist, Recovery Checklist, Web Software,
Shell Checking, CIBIR Software, Computer Crime Investigation Work, Growing Areas Of Computer Crime Investigation, Book Recommendations, The P.I. Roadmap |