Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Cybercrime [electronic resource] : a reference handbook / Bernadette H. Schell and Clemens Martin.

By: Schell, Bernadette H. (Bernadette Hlubik), 1952-.
Contributor(s): Martin, Clemens.
Material type: TextTextSeries: Contemporary world issues: Publisher: Santa Barbara, CA : ABC-CLIO, 2004Description: 1 online resource (1 v.).ISBN: 1851096884 (electronic bk.); 9781851096886 (electronic bk.); 1851096833 (hardcover : alk. paper); 9781851096831 (hardcover : alk. paper); 1280711434; 9781280711435.Subject(s): Computer crimes | Cyberterrorism | TRUE CRIME -- White Collar CrimeGenre/Form: Electronic books.Additional physical formats: Print version:: Cybercrime.DDC classification: 364.16/8 Online resources: EBSCOhost
Contents:
A history and categories of cybercrime -- Basic cybercrime terms -- Birth of the White Hats -- The origin of the Black Hat label in the United States and Britain -- Y2K : fears emerge about cyberterrorism -- Post-Y2K incidents exacerbating cyberterrorist fears -- Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- Incidents exacerbating cyberterrorism anxieties -- The importance of social engineering to cybercriminals -- Categories of cybercrime : harm to property and/or to persons -- Criminal liability and the coincidence of four elements -- The increasing complexity of property cybercrime -- Cybercrimes against persons -- The nonoffenses of cybervigilantism and hacktivism -- Issues, controversies, and solutions -- Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- Methods used to commit cybercrime, cases, and countermeasures -- Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- Controversial "non-cases" of cracking -- Overview of system vulnerabilities and related controversies -- How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- A case study : outlining the "real" threat of a possible coordinated terror attack -- Using honeypots to better know "the enemy", and controversies surrounding them -- More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- Chronology -- Biographical sketches -- Cybercrime legal cases -- A summary of recent U.S. anti-terror and anti-cybercrime legislation -- General observations about recent trends in cybercrime -- Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.
Summary: Documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

"This book is also available on the World Wide Web as an e-book."

Includes bibliographical references and index.

A history and categories of cybercrime -- Basic cybercrime terms -- Birth of the White Hats -- The origin of the Black Hat label in the United States and Britain -- Y2K : fears emerge about cyberterrorism -- Post-Y2K incidents exacerbating cyberterrorist fears -- Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- Incidents exacerbating cyberterrorism anxieties -- The importance of social engineering to cybercriminals -- Categories of cybercrime : harm to property and/or to persons -- Criminal liability and the coincidence of four elements -- The increasing complexity of property cybercrime -- Cybercrimes against persons -- The nonoffenses of cybervigilantism and hacktivism -- Issues, controversies, and solutions -- Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- Methods used to commit cybercrime, cases, and countermeasures -- Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- Controversial "non-cases" of cracking -- Overview of system vulnerabilities and related controversies -- How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- A case study : outlining the "real" threat of a possible coordinated terror attack -- Using honeypots to better know "the enemy", and controversies surrounding them -- More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- Chronology -- Biographical sketches -- Cybercrime legal cases -- A summary of recent U.S. anti-terror and anti-cybercrime legislation -- General observations about recent trends in cybercrime -- Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.

Documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Cybercrime by Schell, Bernadette H. ©2004
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter