Cybercrime : a reference handbook / Bernadette H. Schell and Clemens Martin. [print]
Material type: TextSeries: Contemporary world issuesPublication details: Santa Barbara, California : ABC-CLIO, [(c)2004.Description: xiv, 247 pages ; 24 cmContent type:- text
- unmediated
- volume
- 1851096833
- HV6773.C934 2004
- HV6773.M379.C934 2004
- COPYRIGHT NOT covered - Click this link to request copyright permission:
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Withdrawn | G. Allen Fleece Library Withdrawn | Non-fiction | HV6773.S3547 2004 (Browse shelf(Opens below)) | WITHDRAWN Not for loan | 31923001102637 |
A history and categories of cybercrime Basic cybercrime terms Birth of the White Hats The origin of the Black Hat label in the United States and Britain Y2K : fears emerge about cyberterrorism Post-Y2K incidents exacerbating cyberterrorist fears Countering cyberterrorists : the U.S. Homeland Security Act of 2002 Incidents exacerbating cyberterrorism anxieties The importance of social engineering to cybercriminals Categories of cybercrime : harm to property and/or to persons Criminal liability and the coincidence of four elements The increasing complexity of property cybercrime Cybercrimes against persons The nonoffenses of cybervigilantism and hacktivism Issues, controversies, and solutions Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions Methods used to commit cybercrime, cases, and countermeasures Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act Controversial "non-cases" of cracking Overview of system vulnerabilities and related controversies How chief operating officers worldwide are feeling about their systems' vulnerabilities and why A case study : outlining the "real" threat of a possible coordinated terror attack Using honeypots to better know "the enemy", and controversies surrounding them More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? ; Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime Chronology Biographical sketches Cybercrime legal cases A summary of recent U.S. anti-terror and anti-cybercrime legislation General observations about recent trends in cybercrime Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.
COPYRIGHT NOT covered - Click this link to request copyright permission:
There are no comments on this title.