Who is this book for?
Everyone. Law enforcement, public sector, private sector, education sector, teachers, students, and the curious. Organizations and individuals. Investigators of all types and stripes no matter the job title.
Want more details? Here's a more exhaustive description.
Public sector includes all of those in government, law enforcement, regulators, policy makers, law makers, judges, and more.
Law enforcement includes: Prosecutor's offices, police agencies, local, state, and federal law enforcement, and those who work there whatever their title (including prosecutors, police officers, state troopers, investigators, detectives, agents, special agents, paralegals, trial preparation assistants, analysts, digital forensics examiners, forensic accountants, and many others).
The private sector includes organizations and entities of nearly any type, corporations, businesses, banks, financial institutions, non-profits, investigations and consulting firms, and those who work there, including information security professionals, information technology professionals, digital forensics examiners, private investigators and consultants, attorneys of all types including general counsel, in-house counsel, outside counsel, privacy professionals, anti-money laundering (AML) professionals, and many others.
The education sector includes professors, teachers, instructors, and students. Applications include law school, graduate level, undergraduate, community college, single day or multi-day training courses. Topics include cybercrime, cybercrime investigations, law, cyberlaw, attribution (identification), financial investigation, virtual currency, apprehension, and many others.
This book also is recommended for anyone interested in cybercrime investigation, including journalists, true-crime enthusiasts, and anyone looking for a good read about this highly important topic.
Is this just for techies? Do I need technical knowledge or experience to understand this book or do cybercrime investigations?
Absolutely not. Good cybercrime investigators come from all backgrounds and with diverse skill sets. The book has a chapter that clearly explains computers, networks, and digital forensics, and another chapter on information security. These chapters allow any reader to understand the technology-related terms and steps necessary to undertake a cybercrime investigation, and to have a productive conversation with technical experts.
Who investigates cybercrime? Is it just law enforcement and "private investigators"?
Lots of different people investigate cybercrime, with different titles, backgrounds, and specialties. Cybercrime investigators include paralegals, analysts, attorneys working on the case, anyone involved in the incident response and trying to figure out what happened. See above, our more exhaustive list on who the book is for.
Who is the publisher?
Taylor & Francis Group is the publisher, and they publish books for all levels of academic study and professional development. Their imprints include Routledge, CRC Press, and more. This book is under the CRC Press imprint.
Who are the authors?
John Bandler and Antonia Merzon, see the page about us.
How do I get the book?
See our page on that, it's available through the publisher's sites, Amazon, and more.
When is the book coming out?
It is now available! See our page here on some of the many places to find it online.
Tell me more! What topics does the book cover?
How do I find someone to help me with training, or about investigating or preventing a cybercrime?
You can start here, at our page on speaking, training, and services.