000 | 03685cam a22004694i 4500 | ||
---|---|---|---|
001 | ocm55682154 | ||
003 | OCoLC | ||
005 | 20240726100301.0 | ||
008 | 040615s2004 cau b 001 0 eng | ||
010 | _a2004013960 | ||
039 | 0 | 2 | _aCI ocm55682154 |
039 | 0 | 3 | _aCO 122996 |
039 | 0 | 6 | _aSW ocm55682154 |
040 |
_aDLC _beng _erda _cDLC _dYDX _dIXA _dBAKER _dSBI |
||
042 | _apcc | ||
049 | 0 | 2 | _aSBIM |
049 | 0 | 3 | _aSHCM |
049 | 0 | 6 | _aSGE |
050 | 0 | 4 | _aHV6773.M379.C934 2004 |
050 | 0 | 4 | _aHV6773 |
100 | 1 |
_aSchell, Bernadette H. _q(Bernadette Hlubik), _d1952-, _e1 |
|
245 | 1 | 0 |
_aCybercrime : _ba reference handbook / _cBernadette H. Schell and Clemens Martin. _hPR |
260 |
_aSanta Barbara, California : _bABC-CLIO, _c(c)2004. |
||
300 |
_axiv, 247 pages ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
440 | 0 |
_aContemporary world issues _935027 |
|
504 | _a1 (pages 209-222) and index. | ||
505 | 0 | 0 |
_aA history and categories of cybercrime -- _tBasic cybercrime terms -- _tBirth of the White Hats -- _tThe origin of the Black Hat label in the United States and Britain -- _tY2K : fears emerge about cyberterrorism -- _tPost-Y2K incidents exacerbating cyberterrorist fears -- _tCountering cyberterrorists : the U.S. Homeland Security Act of 2002 -- _tIncidents exacerbating cyberterrorism anxieties -- _tThe importance of social engineering to cybercriminals -- _tCategories of cybercrime : harm to property and/or to persons -- _tCriminal liability and the coincidence of four elements -- _tThe increasing complexity of property cybercrime -- _tCybercrimes against persons -- _tThe nonoffenses of cybervigilantism and hacktivism -- _tIssues, controversies, and solutions -- _tOverview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- _tMethods used to commit cybercrime, cases, and countermeasures -- _tControversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- _tControversial "non-cases" of cracking -- _tOverview of system vulnerabilities and related controversies -- _tHow chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- _tA case study : outlining the "real" threat of a possible coordinated terror attack -- _tUsing honeypots to better know "the enemy", and controversies surrounding them -- _tMore question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- _tGlobal legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- _tChronology -- _tBiographical sketches -- _tCybercrime legal cases -- _tA summary of recent U.S. anti-terror and anti-cybercrime legislation -- _tGeneral observations about recent trends in cybercrime -- _tTimeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030. |
530 | _a2 | ||
650 | 0 | _aComputer crimes. | |
650 | 0 | _aCyberterrorism. | |
700 | 1 | _aMartin, Clemens. | |
856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/description/abc050/2004013960.html _zPublisher description |
856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/ecip0419/2004013960.html _zTable of contents |
907 |
_a.b11077530 _b06-30-14 _c01-22-08 |
||
942 |
_cBK _hHV _m2004 _e _i2018-07-14 _k0.00 |
||
998 |
_accst _acim _aswg _b05-27-09 _cm _da _e- _feng _gcau _h0 |
||
994 |
_a01 _bSBI |
||
945 |
_g1 _i31923001102637 _j2 _lcimc _n"repair" status after fire _o- _p0.00 _q- _r- _s- -- _t61 _u0 _v0 _w0 _x0 _y.i11570404 _z01-22-08 |
||
999 |
_c14842 _d14842 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |