- Strategies used by investigators around the world to seize the fruits of crypto-related crime
- How non-fungible tokens, new alt-currency tokens, and decentralized finance factor into cryptocurrency crime
- The application of common investigative principles—like discovery—to the world of cryptocurrency
An essential and effective playbook for combating crypto-related financial crime, There's No Such Thing as Crypto Crime will earn a place in the libraries of financial investigators, fraud and forensics professionals, and cybercrime specialists.
There's No Such Thing as Crypto Crime - [AUDIOBOOK]
Dodał: 0dayddl
31.01.2025
Wyświetleń: 3
Коmentarzy: 0
There's No Such Thing as Crypto Crime - [AUDIOBOOK]
mp3, pdf | 580.55 MB | Autor: Nick Furneaux | Rok: 2024
Opis:
Hands-on guidance for professionals investigating crimes that include cryptocurrency
In There's No Such Thing as Crypto Crime: An Investigators Guide, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm.
The author explains in detail a variety of essential topics, including how cryptocurrency is used in crime, exploiting wallets, and investigative methodologies for the primary chains, as well as digging into important areas such as tracing through contracts, coin-swaps, layer 2 chains and bridges. He also provides engaging and informative presentations of:
In There's No Such Thing as Crypto Crime: An Investigators Guide, accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm.
The author explains in detail a variety of essential topics, including how cryptocurrency is used in crime, exploiting wallets, and investigative methodologies for the primary chains, as well as digging into important areas such as tracing through contracts, coin-swaps, layer 2 chains and bridges. He also provides engaging and informative presentations of:
Category:Business, Computer Technology, Finance, Nonfiction
Link do pobrania:
Aby zobaczyć ukryty tekst, musisz być zalogowany. Jeżeli nie masz konta, zarejestruj się!
Aby zobaczyć ukryty tekst, musisz być zalogowany. Jeżeli nie masz konta, zarejestruj się!
Aby zobaczyć ukryty tekst, musisz być zalogowany. Jeżeli nie masz konta, zarejestruj się!
Aby zobaczyć ukryty tekst, musisz być zalogowany. Jeżeli nie masz konta, zarejestruj się!
Aby zobaczyć ukryty tekst, musisz być zalogowany. Jeżeli nie masz konta, zarejestruj się!
Aby zobaczyć ukryty tekst, musisz być zalogowany. Jeżeli nie masz konta, zarejestruj się!
DODAJ KOMENTARZ
Informacja
Członkowie grupy Gość nie posiadają uprawnień do komentowania tego artykułu.
KOMENTARZE (0)