Cybercrime: A Reference Handbook / Edition 1

Cybercrime: A Reference Handbook / Edition 1

by Bernadette H. Schell, Clemens Martin
ISBN-10:
1851096833
ISBN-13:
9781851096831
Pub. Date:
10/18/2004
Publisher:
Bloomsbury Academic
ISBN-10:
1851096833
ISBN-13:
9781851096831
Pub. Date:
10/18/2004
Publisher:
Bloomsbury Academic
Cybercrime: A Reference Handbook / Edition 1

Cybercrime: A Reference Handbook / Edition 1

by Bernadette H. Schell, Clemens Martin

Hardcover

$65.0 Current price is , Original price is $65.0. You
$65.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know.

An issue so new and evolving so quickly, there are few sources from which readers can get the information they need to inform themselves about and protect themselves from cybercrime. Written by experts in the field, this reference work contains original essays, descriptions of technical aspects, and numerous contributions from over 100 sources.

Cybercrime uses fascinating case studies to analyze the beginning of cybercrime and the path it has followed to the present day. With biographical sketches of many influential hackers, the reader will better understand the development of the cybercriminal, and how many of these individuals went on to create some of the computer industry's most useful software. From cyberstalking to viruses, scholars and students alike will find the answers they need to understand these issues.


Product Details

ISBN-13: 9781851096831
Publisher: Bloomsbury Academic
Publication date: 10/18/2004
Series: Contemporary World Issues
Edition description: New Edition
Pages: 264
Product dimensions: 6.20(w) x 9.25(h) x 0.95(d)
Age Range: 13 - 18 Years

About the Author

Bernadette H. Schell, PhD, is Dean of the Faculty of Business and Information Technology at the University of Ontario Institute of Technology, Oshawa, Ontario, Canada. Her published works include The Hacking of America : Who's Doing It, Why, and How.

Clemens Martin, PhD, is director of Information Technology Programs in the faculty of business and IT at the University of Ontario Institute of Technology, Oshawa, Ontario, Canada.

Table of Contents

Prefacexi
1History and Types of Cybercrime1
Basic Cybercrime Terms1
Hacker and Cracker1
Cybercrime2
History of Cybercrime4
The White Hats4
The Black Hats7
Emerging Fears about Cyberterrorism10
Countering Cyberterrorists: The Homeland Security Act18
2003: Exacerbating Cyberterrorism Anxieties19
Types of Cybercrime28
Social Engineering28
Categories of Cybercrime29
Criminal Liability: Four Elements32
Property Cybercrime36
Cybercrimes against Persons39
The Nonoffenses of Cybervigilantism and Hacktivism41
Using Anonymity to Conceal Cybercrimes42
Conclusion43
References44
2Issues, Controversies, and Solutions49
Computer System Intrusions50
Recent Statistics on Computer Intrusions50
Cracking53
Flooding58
Viruses and Worms61
Spoofing65
Phreaking70
Piracy, Intellectual Property Rights, and Copyright71
Two Controversial "Cases" of Cracking76
Issues and Controversies Related to System Vulnerabilities78
The National Strategy to Secure Cyberspace78
Software79
Challenges Faced by System Administrators84
A Theoretical Study: A Possible Coordinated Terror Attack93
Honeypots and Controversies Surrounding Them97
Operating Systems-Are Some More Secure Than Others?100
Legislative Countermeasures and Controversies102
Conclusion104
References105
3Chronology111
Cybercrime Timeline111
References135
4Biographical Sketches139
Abene, Mark (a.k.a. Phiber Optik) (1972- )139
Byron, Ada (1815-1852)139
Caffrey, Aaron (1982- )140
Cummings, Edward E. (a.k.a. Bernie S.) (1963- )141
Denning, Dorothy (1945- )141
Draper, John (a.k.a. Cap'n Crunch) (1945- )142
Gorman, Sean (1974- )142
Jobs, Steve (1955- )143
Levin, Vladimir (1971- )143
Mafiaboy (1985- )144
Mitnick, Kevin (a.k.a. Condor) (1963- )144
Morris, Robert (a.k.a. rtm) (1966- )144
Poulsen, Kevin (a.k.a. Dark Dante) (1966- )145
Raymond, Eric Steven (1957- )145
Ritchie, Dennis (a.k.a. dmr) (1941- )146
Shimomura, Tsutomu (1966- )146
Sklyarov, Dmitry (1947- )147
Stallman, Richard (1953- )147
Thompson, Ken (1943- )148
Wozniak, Steve (a.k.a. Oak Toebark, a.k.a. Woz) (1950- )148
References149
5Cybercrime Legal Cases151
Summary of Legislation151
Trends and Observations in Cybercrime155
Cybercriminals Tend to Be Male155
Cybercrime Could Move from Cyberspace to Outer Space156
Computer Crime Cases156
1998156
1999158
2000162
2001164
2002170
2003181
2004192
References193
6Agencies and Organizations195
Government Agencies195
Independent Organizations197
Suppliers of Products and Services201
Security Training, Education, and Certification201
Academic Degrees202
Antivirus Software203
Firewalls205
Intrusion Detection Systems (IDS)207
7Print and Nonprint Resources209
Books210
Web Sites219
Hacking Sites219
Security Sites220
Intrusion Detection Systems220
U.S. Government and International Cybercrime Sites222
Film222
Glossary223
Index231
About the Authors247
From the B&N Reads Blog

Customer Reviews