Skip to product information
1 of 1

Thomas J. Holt,Adam M. Bossler,Kathryn C. Seigfried-Spellar

Cybercrime and Digital Forensics: An Introduction

Cybercrime and Digital Forensics: An Introduction

Regular price £124.20 GBP
Regular price £135.00 GBP Sale price £124.20 GBP
8% OFF Sold out
Tax included. Shipping calculated at checkout.

YOU SAVE £10.80

  • Condition: Brand new
  • UK Delivery times: Usually arrives within 2 - 3 working days
  • UK Shipping: Fee starts at £2.39. Subject to product weight & dimension
Trustpilot 4.5 stars rating  Excellent
We're rated excellent on Trustpilot.
  • More about Cybercrime and Digital Forensics: An Introduction


This book provides a comprehensive and integrative introduction to cybercrime, covering key theoretical and methodological perspectives, computer hacking, digital piracy, economic crime, pornography, online sex crime, cyber-bullying, cyber-stalking, cyber-terrorism, the Dark Web, digital forensic investigation, law enforcement response, policy, and legislation. It is revised and updated with two new chapters on cyberwarfare and illicit market operations and includes lively features such as discussion questions, boxed examples, quotes, and a glossary. It is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

Format: Hardback
Length: 790 pages
Publication date: 31 May 2022
Publisher: Taylor & Francis Ltd


This comprehensive and cutting-edge book provides a thorough and holistic introduction to the realm of cybercrime. It serves as an authoritative synthesis of the diverse literature on the various forms of cybercrime, the global investigation and detection of cybercrime, and the broader role of technology as a facilitator for social relationships between deviants and criminals. The book encompasses a wide range of topics, including:

Key theoretical and methodological perspectives: This section delves into the theoretical frameworks and methodological approaches used to study cybercrime. It explores the various schools of thought and analytical frameworks employed in understanding the nature, causes, and consequences of cybercrime.

Computer hacking and malicious software: This chapter explores the techniques and methods used by cybercriminals to gain unauthorized access to computer systems, compromise security, and exploit vulnerabilities. It discusses the use of hacking tools, malware, and other malicious software to perpetrate cyberattacks and steal sensitive information.

Digital piracy and intellectual theft: This section examines the illegal acquisition and distribution of copyrighted content, including music, movies, software, and intellectual property. It explores the economic implications of digital piracy and the measures taken by governments and organizations to combat it.

Economic crime and online fraud: This chapter explores the various forms of economic crime that occur online, such as credit card fraud, identity theft, and online auction fraud. It discusses the techniques used by cybercriminals to exploit vulnerabilities in online systems and the legal consequences of these crimes.

Pornography and online sex crime: This section examines the proliferation of online pornography and the associated risks and harms to individuals, particularly children. It explores the legal and ethical implications of online sex crime and the measures taken by governments and organizations to address it.

Cyber-bullying and cyber-stalking: This chapter explores the harmful effects of cyberbullying and cyberstalking on individuals, particularly vulnerable groups such as children and adolescents. It discusses the strategies used by cybercriminals to target and harass individuals online and the legal and social responses to these crimes.

Cyber-terrorism and extremism: This section examines the use of technology for extremist purposes, such as recruiting members, spreading propaganda, and planning terrorist attacks. It explores the legal and ethical challenges associated with countering cyberterrorism and the measures taken by governments and organizations to prevent and respond to these threats.

The rise of the Dark Web: This chapter explores the hidden and anonymous nature of the Dark Web, which is a part of the World Wide Web that is primarily accessed through specialized web browsers and is known for its illegal activities such as drug trafficking, weapons sales, and human trafficking. It discusses the techniques used by cybercriminals to operate on the Dark Web and the challenges faced by law enforcement agencies in investigating and disrupting these activities.

Digital forensic investigation and its legal context around the world: This section examines the process of conducting digital forensic investigations and the legal frameworks that govern these investigations. It discusses the legal requirements for collecting and preserving digital evidence, the methods used to analyze and interpret digital evidence, and the legal implications of using digital forensics in criminal investigations.

The law enforcement response to cybercrime transnationally: This chapter explores the challenges faced by law enforcement agencies in responding to cybercrime that crosses national boundaries. It discusses the coordination and cooperation between different countries in investigating and prosecuting cybercriminals, as well as the legal frameworks and international agreements that facilitate these efforts.

Cybercrime policy and legislation across the globe: This section examines the policies and legislation enacted by governments and organizations to address cybercrime. It discusses the legal frameworks and regulatory frameworks that govern the use of technology, the protection of personal data, and the prevention and response to cybercrime.

The new edition of this book has been revised and updated, featuring two new chapters:

The first chapter offers an expanded discussion of cyberwarfare and information operations online, exploring the techniques and strategies used by governments and organizations to defend against cyberattacks and protect critical infrastructure.

The second chapter discusses illicit market operations for all sorts of products on both the Open and Dark Web, examining the methods used by cybercriminals to operate these markets and the challenges faced by law enforcement agencies in disrupting these activities.

In addition to its comprehensive coverage of cybercrime, this book includes lively and engaging features such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources.

This text is an essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology. It provides students with a comprehensive understanding of the complex and evolving nature of cybercrime and its impact on society.

Weight: 1660g
Dimension: 246 x 174 (mm)
ISBN-13: 9780367360061
Edition number: 3 ed

This item can be found in:

UK and International shipping information

UK Delivery and returns information:

  • Delivery within 2 - 3 days when ordering in the UK.
  • Shipping fee for UK customers from £2.39. Fully tracked shipping service available.
  • Returns policy: Return within 30 days of receipt for full refund.

International deliveries:

Shulph Ink now ships to Australia, Belgium, Canada, France, Germany, Ireland, Italy, India, Luxembourg Saudi Arabia, Singapore, Spain, Netherlands, New Zealand, United Arab Emirates, United States of America.

  • Delivery times: within 5 - 10 days for international orders.
  • Shipping fee: charges vary for overseas orders. Only tracked services are available for most international orders. Some countries have untracked shipping options.
  • Customs charges: If ordering to addresses outside the United Kingdom, you may or may not incur additional customs and duties fees during local delivery.
View full details