Cybercrime : a reference handbook / Bernadette H. Schell and Clemens Martin.

Saved in:
Bibliographic Details
Online Access: View publisher description
Main Author: Schell, Bernadette H. (Bernadette Hlubik), 1952-
Other Authors: Martin, Clemens
Format: Book
Language:English
Published: Santa Barbara, Calif. : ABC-CLIO, ©2004.
Series:Contemporary world issues.
Subjects:

MARC

LEADER 00000cam a22000004a 4500
001 b3755543
003 CoU
005 20050805033425.0
008 040615s2004 cau b 001 0 eng
010 |a 2004013960 
020 |a 1851096833 (hardcover : alk. paper) 
035 |a (OCoLC)ocm55682154 
040 |a DLC  |c DLC  |d YDX  |d OCL  |d IXA  |d BAKER 
042 |a pcc 
049 |a CODA 
050 0 0 |a HV6773  |b .S3547 2004 
050 0 0 |a HV6773  |b .S3547 2004 
100 1 |a Schell, Bernadette H.  |q (Bernadette Hlubik),  |d 1952-  |0 http://id.loc.gov/authorities/names/n90693084  |1 http://isni.org/isni/0000000110351857. 
245 1 0 |a Cybercrime :  |b a reference handbook /  |c Bernadette H. Schell and Clemens Martin. 
260 |a Santa Barbara, Calif. :  |b ABC-CLIO,  |c ©2004. 
300 |a xiv, 247 pages ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent. 
337 |a unmediated  |b n  |2 rdamedia. 
338 |a volume  |b nc  |2 rdacarrier. 
490 1 |a Contemporary world issues. 
504 |a Includes bibliographical references (pages 209-222) and index. 
505 0 |a A history and categories of cybercrime -- Basic cybercrime terms -- Birth of the White Hats -- The origin of the Black Hat label in the United States and Britain -- Y2K : fears emerge about cyberterrorism -- Post-Y2K incidents exacerbating cyberterrorist fears -- Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- Incidents exacerbating cyberterrorism anxieties -- The importance of social engineering to cybercriminals -- Categories of cybercrime : harm to property and/or to persons -- Criminal liability and the coincidence of four elements -- The increasing complexity of property cybercrime -- Cybercrimes against persons -- The nonoffenses of cybervigilantism and hacktivism -- Issues, controversies, and solutions -- Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- Methods used to commit cybercrime, cases, and countermeasures -- Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- Controversial "non-cases" of cracking -- Overview of system vulnerabilities and related controversies -- How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- A case study : outlining the "real" threat of a possible coordinated terror attack -- Using honeypots to better know "the enemy", and controversies surrounding them -- More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- Chronology -- Biographical sketches -- Cybercrime legal cases -- A summary of recent U.S. anti-terror and anti-cybercrime legislation -- General observations about recent trends in cybercrime -- Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030. 
650 0 |a Computer crimes.  |0 http://id.loc.gov/authorities/subjects/sh85029492. 
650 0 |a Cyberterrorism.  |0 http://id.loc.gov/authorities/subjects/sh00001974. 
700 1 |a Martin, Clemens.  |0 http://id.loc.gov/authorities/names/n2004101833  |1 http://isni.org/isni/000000003675995X. 
830 0 |a Contemporary world issues.  |0 http://id.loc.gov/authorities/names/n86726709. 
856 4 2 |z View publisher description  |u http://www.loc.gov/catdir/description/abc051/2004013960.html 
907 |a .b37555431  |b 10-11-22  |c 08-03-05 
998 |a nor  |b 02-22-06  |c a  |d m   |e -  |f eng  |g cau  |h 0  |i 2 
907 |a .b37555431  |b 11-24-14  |c 08-03-05 
944 |a MARS - RDA ENRICHED 
907 |a .b37555431  |b 12-30-08  |c 08-03-05 
907 |a .b37555431  |b 02-22-06  |c 08-03-05 
946 |a ssh 
999 f f |i a1cb7311-8b39-5915-9c65-d8e6b20b45d9  |s d9e0deee-6291-513f-9640-b26e41c42947 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Boulder Campus  |c Norlin  |d Norlin Library - Stacks  |e HV6773 .S3547 2004  |h Library of Congress classification  |i book  |m U183045998955  |n 1