You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher.
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect. Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime—crackers have accessed information in the records of large, respected organizations, institutions, and even the military. This is your guide to understanding hacker terminology. It's up to ...
This book critically reflects on the relationship between ‘core crimes’ which make up the subject matter jurisdiction of the International Criminal Court (such as war crimes, crimes against humanity, genocide, and aggression) and transnational crimes. The contributions in the book address the features of several transnational crimes and generally acknowledge that the boundaries between core crimes and transnational crimes are blurring. One of the major questions is whether, in view of this gradual merger of the categories, the distinction in legal regime is still warranted. Should prosecution and trial of transnational crimes be transferred from national to international jurisdictions?
Cyber warfare has become more pervasive and more complex in recent years. It is difficult to regulate, as it holds an ambiguous position within the laws of war. This book investigates the legal and ethical ramifications of cyber war, considering which sets of laws apply to it, and how it fits into traditional ideas of armed conflict.
Die International Bibliographiy of Historical Sciences verzeichnet jährlich die bedeutendsten Neuerscheinungen geschichtswissenschaftlicher Monographien und Zeitschriftenartikel weltweit, die inhaltlich von der Vor- und Frühgeschichte bis zur jüngsten Vergangenheit reichen. Sie ist damit die derzeit einzige laufende Bibliographie dieser Art, die thematisch, zeitlich und geographisch ein derart breites Spektrum abdeckt. Innerhalb der systematischen Gliederung nach Zeitalter, Region oder historischer Disziplin sind die Werke nach Autorennamen oder charakteristischem Titelhauptwort aufgelistet.
The result is an important contribution to the literature on a growing hazard for people in the workplace, and an essential resource for executives and managers who must cope with it."--BOOK JACKET.
Table of contents
Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. An issue so new and evolving so quickly, there are few sources from which readers can get the information they need to inform themselves about and protect themselves from cybercrime. Written by experts in the field, this reference work contains original essays, descriptions of technical aspects, and numerous contributions from over 100 sources. Cybercrime uses fascinating case studies to analyze the beginning of cybercrime and the path it has followed to the present day. With biographical sketches of many influential hackers, the reader will better understand the development of the cybercriminal, and how many of these individuals went on to create some of the computer industry's most useful software. From cyberstalking to viruses, scholars and students alike will find the answers they need to understand these issues.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud—acts that can have devastating effects upon our modern information society.
Covering topics ranging from web filters to laws aimed at preventing the flow of information, this book explores freedom—and censorship—of the Internet and considers the advantages and disadvantages of policies at each end of the spectrum. Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In Internet Censorship: A Reference Handbook, experts help readers understand these diverse views o...