ECU Libraries Catalog
Librarian View
LEADER 03730cam 22004814a 4500
001
ocm55682154
003
OCoLC
005
20141212180556.0
008
040615s2004 cau b 001 0 eng
010
a| 2004013960
020
a| 1851096833 (hardcover : alk. paper)
035
a| (Sirsi) o55682154
035
a| (OCoLC)55682154
040
a| DLC
c| DLC
d| YDX
d| UtOrBLW
042
a| pcc
049
a| ERER
050
0
0
a| HV6773
b| .S3547 2004
082
0
0
a| 364.16/8
2| 22
090
a| HV6773
b| .S34 2004
100
1
a| Schell, Bernadette H.
q| (Bernadette Hlubik),
d| 1952-
=| ^A388428
245
1
0
a| Cybercrime :
b| a reference handbook /
c| Bernadette H. Schell and Clemens Martin.
260
a| Santa Barbara, Calif. :
b| ABC-CLIO,
c| ©2004.
300
a| xiv, 247 pages ;
c| 24 cm.
336
a| text
2| rdacontent
337
a| unmediated
2| rdamedia
338
a| volume
2| rdacarrier
490
1
a| Contemporary world issues
500
a| "This book is also available on the World Wide Web as an e-book."
504
a| Includes bibliographical references (p. 209-222) and index.
505
0
a| A history and categories of cybercrime -- Basic cybercrime terms -- Birth of the White Hats -- The origin of the Black Hat label in the United States and Britain -- Y2K : fears emerge about cyberterrorism -- Post-Y2K incidents exacerbating cyberterrorist fears -- Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- Incidents exacerbating cyberterrorism anxieties -- The importance of social engineering to cybercriminals -- Categories of cybercrime : harm to property and/or to persons -- Criminal liability and the coincidence of four elements -- The increasing complexity of property cybercrime -- Cybercrimes against persons -- The nonoffenses of cybervigilantism and hacktivism -- Issues, controversies, and solutions -- Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- Methods used to commit cybercrime, cases, and countermeasures -- Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- Controversial "non-cases" of cracking -- Overview of system vulnerabilities and related controversies -- How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- A case study : outlining the "real" threat of a possible coordinated terror attack -- Using honeypots to better know "the enemy", and controversies surrounding them -- More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- Chronology -- Biographical sketches -- Cybercrime legal cases -- A summary of recent U.S. anti-terror and anti-cybercrime legislation -- General observations about recent trends in cybercrime -- Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.
650
0
a| Computer crimes.
=| ^A81625
650
0
a| Cyberterrorism.
=| ^A463448
700
1
a| Martin, Clemens.
=| ^A587130
830
0
a| Contemporary world issues.
=| ^A226726
856
4
1
3| Table of contents
u| http://www.loc.gov/catdir/toc/ecip0419/2004013960.html
856
4
2
3| Publisher description
u| http://www.loc.gov/catdir/description/abc051/2004013960.html
994
a| X0
b| ERE
910
a| PromptCat
980
a| 2004-11-17
b| 50
d| 0
e| 42
f| 490103
590
a| Little-347907--305131054214T
596
a| 1 2
998
a| 979940
999
a| HV6773.S3547 2004
w| LC
c| 1
i| 30372012610843
d| 4/21/2014
e| 4/2/2014
l| JGES
m| JOYNER
n| 4
p| $42.00
q| 1
r| Y
s| Y
t| JGESBK
u| 11/29/2004
x| BOOK
z| JSTACKS
o| .STAFF. 0