Image from Google Jackets

Cybercrime : a reference handbook / Bernadette H. Schell and Clemens Martin. [print]

By: Contributor(s): Material type: TextTextSeries: Contemporary world issuesPublication details: Santa Barbara, California : ABC-CLIO, [(c)2004.Description: xiv, 247 pages ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 1851096833
Subject(s): LOC classification:
  • HV6773.C934 2004
  • HV6773.M379.C934 2004
Online resources: Available additional physical forms:
  • COPYRIGHT NOT covered - Click this link to request copyright permission:
Contents:
A history and categories of cybercrime Basic cybercrime terms Birth of the White Hats The origin of the Black Hat label in the United States and Britain Y2K : fears emerge about cyberterrorism Post-Y2K incidents exacerbating cyberterrorist fears Countering cyberterrorists : the U.S. Homeland Security Act of 2002 Incidents exacerbating cyberterrorism anxieties The importance of social engineering to cybercriminals Categories of cybercrime : harm to property and/or to persons Criminal liability and the coincidence of four elements The increasing complexity of property cybercrime Cybercrimes against persons The nonoffenses of cybervigilantism and hacktivism Issues, controversies, and solutions Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions Methods used to commit cybercrime, cases, and countermeasures Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act Controversial "non-cases" of cracking Overview of system vulnerabilities and related controversies How chief operating officers worldwide are feeling about their systems' vulnerabilities and why A case study : outlining the "real" threat of a possible coordinated terror attack Using honeypots to better know "the enemy", and controversies surrounding them More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? ; Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime Chronology Biographical sketches Cybercrime legal cases A summary of recent U.S. anti-terror and anti-cybercrime legislation General observations about recent trends in cybercrime Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.
Item type: Circulating Book (checkout times vary with patron status)
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Withdrawn G. Allen Fleece Library Withdrawn Non-fiction HV6773.S3547 2004 (Browse shelf(Opens below)) WITHDRAWN Not for loan 31923001102637

A history and categories of cybercrime Basic cybercrime terms Birth of the White Hats The origin of the Black Hat label in the United States and Britain Y2K : fears emerge about cyberterrorism Post-Y2K incidents exacerbating cyberterrorist fears Countering cyberterrorists : the U.S. Homeland Security Act of 2002 Incidents exacerbating cyberterrorism anxieties The importance of social engineering to cybercriminals Categories of cybercrime : harm to property and/or to persons Criminal liability and the coincidence of four elements The increasing complexity of property cybercrime Cybercrimes against persons The nonoffenses of cybervigilantism and hacktivism Issues, controversies, and solutions Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions Methods used to commit cybercrime, cases, and countermeasures Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act Controversial "non-cases" of cracking Overview of system vulnerabilities and related controversies How chief operating officers worldwide are feeling about their systems' vulnerabilities and why A case study : outlining the "real" threat of a possible coordinated terror attack Using honeypots to better know "the enemy", and controversies surrounding them More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? ; Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime Chronology Biographical sketches Cybercrime legal cases A summary of recent U.S. anti-terror and anti-cybercrime legislation General observations about recent trends in cybercrime Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.

COPYRIGHT NOT covered - Click this link to request copyright permission:

There are no comments on this title.

to post a comment.

Powered by Koha