000 03685cam a22004694i 4500
001 ocm55682154
003 OCoLC
005 20240726100301.0
008 040615s2004 cau b 001 0 eng
010 _a2004013960
039 0 2 _aCI ocm55682154
039 0 3 _aCO 122996
039 0 6 _aSW ocm55682154
040 _aDLC
_beng
_erda
_cDLC
_dYDX
_dIXA
_dBAKER
_dSBI
042 _apcc
049 0 2 _aSBIM
049 0 3 _aSHCM
049 0 6 _aSGE
050 0 4 _aHV6773.M379.C934 2004
050 0 4 _aHV6773
100 1 _aSchell, Bernadette H.
_q(Bernadette Hlubik),
_d1952-,
_e1
245 1 0 _aCybercrime :
_ba reference handbook /
_cBernadette H. Schell and Clemens Martin.
_hPR
260 _aSanta Barbara, California :
_bABC-CLIO,
_c(c)2004.
300 _axiv, 247 pages ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
440 0 _aContemporary world issues
_935027
504 _a1 (pages 209-222) and index.
505 0 0 _aA history and categories of cybercrime --
_tBasic cybercrime terms --
_tBirth of the White Hats --
_tThe origin of the Black Hat label in the United States and Britain --
_tY2K : fears emerge about cyberterrorism --
_tPost-Y2K incidents exacerbating cyberterrorist fears --
_tCountering cyberterrorists : the U.S. Homeland Security Act of 2002 --
_tIncidents exacerbating cyberterrorism anxieties --
_tThe importance of social engineering to cybercriminals --
_tCategories of cybercrime : harm to property and/or to persons --
_tCriminal liability and the coincidence of four elements --
_tThe increasing complexity of property cybercrime --
_tCybercrimes against persons --
_tThe nonoffenses of cybervigilantism and hacktivism --
_tIssues, controversies, and solutions --
_tOverview of the number of reported incidents of computer system intrusions, government agencies, and institutions --
_tMethods used to commit cybercrime, cases, and countermeasures --
_tControversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act --
_tControversial "non-cases" of cracking --
_tOverview of system vulnerabilities and related controversies --
_tHow chief operating officers worldwide are feeling about their systems' vulnerabilities and why --
_tA case study : outlining the "real" threat of a possible coordinated terror attack --
_tUsing honeypots to better know "the enemy", and controversies surrounding them --
_tMore question of interest : operating systems software--are some more vulnerable to cracking exploits than others? --
_tGlobal legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime --
_tChronology --
_tBiographical sketches --
_tCybercrime legal cases --
_tA summary of recent U.S. anti-terror and anti-cybercrime legislation --
_tGeneral observations about recent trends in cybercrime --
_tTimeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.
530 _a2
650 0 _aComputer crimes.
650 0 _aCyberterrorism.
700 1 _aMartin, Clemens.
856 4 2 _3Publisher description
_uhttp://www.loc.gov/catdir/description/abc050/2004013960.html
_zPublisher description
856 4 1 _3Table of contents
_uhttp://www.loc.gov/catdir/toc/ecip0419/2004013960.html
_zTable of contents
907 _a.b11077530
_b06-30-14
_c01-22-08
942 _cBK
_hHV
_m2004
_e
_i2018-07-14
_k0.00
998 _accst
_acim
_aswg
_b05-27-09
_cm
_da
_e-
_feng
_gcau
_h0
994 _a01
_bSBI
945 _g1
_i31923001102637
_j2
_lcimc
_n"repair" status after fire
_o-
_p0.00
_q-
_r-
_s- --
_t61
_u0
_v0
_w0
_x0
_y.i11570404
_z01-22-08
999 _c14842
_d14842
902 _a1
_bCynthia Snell
_c1
_dCynthia Snell