Cybercrime : a reference handbook /

Saved in:
Bibliographic Details
Author / Creator:Schell, Bernadette H. (Bernadette Hlubik), 1952-
Imprint:Santa Barbara, Calif. : ABC-CLIO, c2004.
Description:xiv, 247 p. ; 24 cm.
Language:English
Series:Contemporary world issues
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/5988053
Hidden Bibliographic Details
Other authors / contributors:Martin, Clemens.
ISBN:1851096833 (hardcover : alk. paper)
Notes:Includes bibliographical references (p. 209-222) and index.
Table of Contents:
  • Preface
  • 1. History and Types of Cybercrime
  • Basic Cybercrime Terms
  • Hacker and Cracker
  • Cybercrime
  • History of Cybercrime
  • The White Hats
  • The Black Hats
  • Emerging Fears about Cyberterrorism
  • Countering Cyberterrorists: The Homeland Security Act
  • 2003: Exacerbating Cyberterrorism Anxieties
  • Types of Cybercrime
  • Social Engineering
  • Categories of Cybercrime
  • Criminal Liability: Four Elements
  • Property Cybercrime
  • Cybercrimes against Persons
  • The Nonoffenses of Cybervigilantism and Hacktivism
  • Using Anonymity to Conceal Cybercrimes
  • Conclusion
  • References
  • 2. Issues, Controversies, and Solutions
  • Computer System Intrusions
  • Recent Statistics on Computer Intrusions
  • Cracking
  • Flooding
  • Viruses and Worms
  • Spoofing
  • Phreaking
  • Piracy, Intellectual Property Rights, and Copyright
  • Two Controversial "Cases" of Cracking
  • Issues and Controversies Related to System Vulnerabilities
  • The National Strategy to Secure Cyberspace
  • Software
  • Challenges Faced by System Administrators
  • A Theoretical Study: A Possible Coordinated Terror Attack
  • Honeypots and Controversies Surrounding Them
  • Operating Systems-Are Some More Secure Than Others?
  • Legislative Countermeasures and Controversies
  • Conclusion
  • References
  • 3. Chronology
  • Cybercrime Timeline
  • References
  • 4. Biographical Sketches
  • Abene, Mark (a.k.a. Phiber Optik) (1972- )
  • Byron, Ada (1815-1852)
  • Caffrey, Aaron (1982- )
  • Cummings, Edward E. (a.k.a. Bernie S.) (1963- )
  • Denning, Dorothy (1945- )
  • Draper, John (a.k.a. Cap'n Crunch) (1945- )
  • Gorman, Sean (1974- )
  • Jobs, Steve (1955- )
  • Levin, Vladimir (1971- )
  • Mafiaboy (1985- )
  • Mitnick, Kevin (a.k.a. Condor) (1963- )
  • Morris, Robert (a.k.a. rtm) (1966- )
  • Poulsen, Kevin (a.k.a. Dark Dante) (1966- )
  • Raymond, Eric Steven (1957- )
  • Ritchie, Dennis (a.k.a. dmr) (1941- )
  • Shimomura, Tsutomu (1966- )
  • Sklyarov, Dmitry (1947- )
  • Stallman, Richard (1953- )
  • Thompson, Ken (1943- )
  • Wozniak, Steve (a.k.a. Oak Toebark, a.k.a. Woz) (1950- )
  • References
  • 5. Cybercrime Legal Cases
  • Summary of Legislation
  • Trends and Observations in Cybercrime
  • Cybercriminals Tend to Be Male
  • Cybercrime Could Move from Cyberspace to Outer Space
  • Computer Crime Cases
  • 1998
  • 1999
  • 2000
  • 2001
  • 2002
  • 2003
  • 2004
  • References
  • 6. Agencies and Organizations
  • Government Agencies
  • Independent Organizations
  • Suppliers of Products and Services
  • Security Training, Education, and Certification
  • Academic Degrees
  • Antivirus Software
  • Firewalls
  • Intrusion Detection Systems (IDS)
  • 7. Print and Nonprint Resources
  • Books
  • Web Sites
  • Hacking Sites
  • Security Sites
  • Intrusion Detection Systems
  • U.S. Government and International Cybercrime Sites
  • Film
  • Glossary
  • Index
  • About the Authors