rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781851096831

Cybercrime: A Reference Handbook

by
  • ISBN13:

    9781851096831

  • ISBN10:

    1851096833

  • Format: Hardcover
  • Copyright: 2004-10-22
  • Publisher: Abc-Clio Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $64.00 Save up to $18.40
  • Rent Book $45.60
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Cybercrime: A Reference Handbook [ISBN: 9781851096831] for the semester, quarter, and short term or search our site for other textbooks by Schell, Bernadette H.. Renting a textbook can save you up to 90% from the cost of buying.

Summary

Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know.

Table of Contents

Preface, xi
1 History and Types of Cybercrime, 1(48)
Basic Cybercrime Terms,
1(3)
Hacker and Cracker,
1(1)
Cybercrime,
2(2)
History of Cybercrime,
4(24)
The White Hats,
4(3)
The Black Hats,
7(3)
Emerging Fears about Cyberterrorism,
10(8)
Countering Cyberterrorists: The Homeland Security Act,
18(1)
2003: Exacerbating Cyberterrorism Anxieties,
19(9)
Types of Cybercrime,
28(15)
Social Engineering,
28(1)
Categories of Cybercrime,
29(3)
Criminal Liability: Four Elements,
32(4)
Property Cybercrime,
36(3)
Cybercrimes against Persons,
39(2)
The Nonoffenses of Cybervigilantism and Hacktivism,
41(1)
Using Anonymity to Conceal Cybercrimes,
42(1)
Conclusion,
43(1)
References,
44(5)
2 Issues, Controversies, and Solutions, 49(62)
Computer System Intrusions,
50(28)
Recent Statistics on Computer Intrusions,
50(3)
Cracking,
53(5)
Flooding,
58(3)
Viruses and Worms,
61(4)
Spoofing,
65(5)
Phreaking,
70(1)
Piracy, Intellectual Property Rights, and Copyright,
71(5)
Two Controversial "Cases" of Cracking,
76(2)
Issues and Controversies Related to System Vulnerabilities,
78(24)
The National Strategy to Secure Cyberspace,
78(1)
Software,
79(5)
Challenges Faced by System Administrators,
84(9)
A Theoretical Study: A Possible Coordinated Terror Attack,
93(4)
Honeypots and Controversies Surrounding Them,
97(3)
Operating Systems-Are Some More Secure Than Others?
100(2)
Legislative Countermeasures and Controversies,
102(2)
Conclusion,
104(1)
References,
105(6)
3 Chronology, 111
Cybercrime Timeline,
111(24)
References,
135(4)
4 Biographical Sketches, 139(12)
Abene, Mark (a.k.a. Phiber Optik) (1972-),
139(1)
Byron, Ada (1815-1852),
139(1)
Caffrey, Aaron (1982- ),
140(1)
Cummings, Edward E. (a.k.a. Bernie S.) (1963-),
141(1)
Denning, Dorothy (1945- ),
141(1)
Draper, John (a.k.a. Cap'n Crunch) (1945-),
142(1)
Gorman, Sean (1974-),
142(1)
Jobs, Steve (1955-),
143(1)
Levin, Vladimir (1971-),
143(1)
Mafiaboy (1985-),
144(1)
Mitnick, Kevin (a.k.a. Condor) (1963-),
144(1)
Morris, Robert (a.k.a. rtm) (1966-),
144(1)
Poulsen, Kevin (a.k.a. Dark Dante) (1966-),
145(1)
Raymond, Eric Steven (1957-),
145(1)
Ritchie, Dennis (a.k.a. dmr) (1941-),
146(1)
Shimomura, Tsutomu (1966-),
146(1)
Sklyarov, Dmitry (1947-),
147(1)
Stallman, Richard (1953-),
147(1)
Thompson, Ken (1943-),
148(1)
Wozniak, Steve (a.k.a. Oak Toebark, a.k.a. Woz) (1950-),
148(1)
References,
149(2)
5 Cybercrime Legal Cases, 151(44)
Summary of Legislation,
151(4)
Trends and Observations in Cybercrime,
155(1)
Cybercriminals Tend to Be Male,
155(1)
Cybercrime Could Move from Cyberspace to Outer Space,
156(1)
Computer Crime Cases,
156(37)
1998,
156(2)
1999,
158(4)
2000,
162(2)
2001,
164(6)
2002,
170(11)
2003,
181(11)
2004,
192(1)
References,
193(2)
6 Agencies and Organizations, 195(14)
Government Agencies,
195(2)
Independent Organizations,
197(4)
Suppliers of Products and Services,
201(8)
Security Training, Education, and Certification,
201(1)
Academic Degrees,
202(1)
Antivirus Software,
203(2)
Firewalls,
205(2)
Intrusion Detection Systems (IDS),
207(2)
7 Print and Nonprint Resources, 209(14)
Books,
210(9)
Web Sites,
219(3)
Hacking Sites,
219(1)
Security Sites,
220(1)
Intrusion Detection Systems,
220(2)
U.S. Government and International Cybercrime Sites,
222(1)
Film,
222(1)
Glossary, 223(8)
Index, 231(16)
About the Authors, 247

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program