Cybercrime : a reference handbook / Bernadette H. Schell and Clemens Martin.
نوع المادة : نصالسلاسل:Contemporary world issuesالناشر:Santa Barbara, Calif. : ABC-CLIO, [2004]تاريخ حقوق النشر: copyright 2004وصف:xiv, 247 pages ; 24 cmنوع المحتوى:- text
- unmediated
- volume
- 1851096833 (hbk)
- HV6773 S3547 2004
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HV6773 S3547 2004 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011076260 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HV6773 S3547 2004 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011076299 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
HV6773 .S25 2019 جريمة الاستغلال الجنسي للطفل عبر الإنترنت : دراسة في تأثير الإباحية الإلكترونية على مستقبل الأمن الإنساني في الدول العربية / | HV6773 .S26 2011 الاحتيال الإلكتروني : الوجه القبيح للتكنولوجيا : الأسباب و الحلول / | HV6773 S3547 2004 Cybercrime : a reference handbook / | HV6773 S3547 2004 Cybercrime : a reference handbook / | HV6773 .S42 2002 الاجرام المعلوماتي / | HV6773 .S56 2002 Safety net : protecting your business on the Internet / | HV6773 .S56 2002 Safety net : protecting your business on the Internet / |
"This book is also available on the World Wide Web as an e-book."
Includes bibliographical references (pages 209-222) and index.
A history and categories of cybercrime -- Basic cybercrime terms -- Birth of the White Hats -- The origin of the Black Hat label in the United States and Britain -- Y2K : fears emerge about cyberterrorism -- Post-Y2K incidents exacerbating cyberterrorist fears -- Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- Incidents exacerbating cyberterrorism anxieties -- The importance of social engineering to cybercriminals -- Categories of cybercrime : harm to property and/or to persons -- Criminal liability and the coincidence of four elements -- The increasing complexity of property cybercrime -- Cybercrimes against persons -- The nonoffenses of cybervigilantism and hacktivism -- Issues, controversies, and solutions -- Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- Methods used to commit cybercrime, cases, and countermeasures -- Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- Controversial "non-cases" of cracking -- Overview of system vulnerabilities and related controversies -- How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- A case study : outlining the "real" threat of a possible coordinated terror attack -- Using honeypots to better know "the enemy", and controversies surrounding them -- More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- Chronology -- Biographical sketches -- Cybercrime legal cases -- A summary of recent U.S. anti-terror and anti-cybercrime legislation -- General observations about recent trends in cybercrime -- Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.