Normal view

Cybercrime : a reference handbook / Bernadette H. Schell and Clemens Martin.

By: Contributor(s): Material type: TextTextSeries: Contemporary world issuesPublisher: Santa Barbara, Calif. : ABC-CLIO, [2004]Copyright date: copyright 2004Description: xiv, 247 pages ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 1851096833 (hbk)
Subject(s): LOC classification:
  • HV6773 S3547 2004
Online resources:
Contents:
A history and categories of cybercrime -- Basic cybercrime terms -- Birth of the White Hats -- The origin of the Black Hat label in the United States and Britain -- Y2K : fears emerge about cyberterrorism -- Post-Y2K incidents exacerbating cyberterrorist fears -- Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- Incidents exacerbating cyberterrorism anxieties -- The importance of social engineering to cybercriminals -- Categories of cybercrime : harm to property and/or to persons -- Criminal liability and the coincidence of four elements -- The increasing complexity of property cybercrime -- Cybercrimes against persons -- The nonoffenses of cybervigilantism and hacktivism -- Issues, controversies, and solutions -- Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- Methods used to commit cybercrime, cases, and countermeasures -- Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- Controversial "non-cases" of cracking -- Overview of system vulnerabilities and related controversies -- How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- A case study : outlining the "real" threat of a possible coordinated terror attack -- Using honeypots to better know "the enemy", and controversies surrounding them -- More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- Chronology -- Biographical sketches -- Cybercrime legal cases -- A summary of recent U.S. anti-terror and anti-cybercrime legislation -- General observations about recent trends in cybercrime -- Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
Book Book UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة HV6773 S3547 2004 (Browse shelf(Opens below)) C.1 Library Use Only | داخل المكتبة فقط 30010011076260
Book Book UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة HV6773 S3547 2004 (Browse shelf(Opens below)) C.2 Available 30010011076299
Total holds: 0

"This book is also available on the World Wide Web as an e-book."

Includes bibliographical references (pages 209-222) and index.

A history and categories of cybercrime -- Basic cybercrime terms -- Birth of the White Hats -- The origin of the Black Hat label in the United States and Britain -- Y2K : fears emerge about cyberterrorism -- Post-Y2K incidents exacerbating cyberterrorist fears -- Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- Incidents exacerbating cyberterrorism anxieties -- The importance of social engineering to cybercriminals -- Categories of cybercrime : harm to property and/or to persons -- Criminal liability and the coincidence of four elements -- The increasing complexity of property cybercrime -- Cybercrimes against persons -- The nonoffenses of cybervigilantism and hacktivism -- Issues, controversies, and solutions -- Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- Methods used to commit cybercrime, cases, and countermeasures -- Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- Controversial "non-cases" of cracking -- Overview of system vulnerabilities and related controversies -- How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- A case study : outlining the "real" threat of a possible coordinated terror attack -- Using honeypots to better know "the enemy", and controversies surrounding them -- More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- Chronology -- Biographical sketches -- Cybercrime legal cases -- A summary of recent U.S. anti-terror and anti-cybercrime legislation -- General observations about recent trends in cybercrime -- Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.

Share

Abu Dhabi, United Arab Emirates

reference@ecssr.ae

+97124044780

Copyright © 2025 Emirates Center for Strategic Studies and Research All Rights Reserved