My Account Log in

1 option

Cybercrime : vandalizing the information society / Steven Furnell.

Van Pelt Library HV6773 .F87 2002
Loading location information...

By Request Item cannot be checked out at the library but can be requested.

Log in to request item
Format:
Book
Author/Creator:
Furnell, Steven, 1970-
Language:
English
Subjects (All):
Computer crimes.
Physical Description:
xi, 316 pages : illustrations ; 24 cm
Place of Publication:
Boston ; London : Addison-Wesley, 2002.
Summary:
This overview of computer-based crime and abuse covers a wide range of crimes and abuses, including those involving hackers and computer viruses. Detailed technical knowledge is not needed and there are examples of incidents that have already occurred.
Contents:
1 "You are here"
welcome to the information society 1
The opportunity
the brave new world 1
The dependency
society's reliance upon information technology 11
The danger
why we need security 13
2 Crime in the information society 21
What is cybercrime? 21
Assessing the scale of the problem 26
Some examples of notable incidents 29
3 Hackers
anti-heroes of the computer revolution? 41
Who or what is a hacker? 41
Phreaking out the phone company 45
Stereotype and self-image 47
What's the motivation? 52
Elements of the hacker culture 58
Hackers as celebrities 77
4 Delving deeper
what hackers do and how they do it 95
Getting in and staying there 95
Common forms of attack 102
Getting the tools to do it for you 116
Using less technological approaches 136
5 Manifestations of malware 143
What is malware? 143
Motivations of the malware writers 149
The evolution of viruses 151
Notable malware incidents 155
Causing problems without writing code 177
Future directions for malware 186
6 Societal impacts of cybercrime 189
Implications for society at large 189
Public attitudes and awareness 191
Electronic commerce
an example of society's need for protection 202
Policing the problem 207
Legislating against computer crime and abuse 210
The problems of enforcing the law 212
Understanding the issues involved 216
Global inconsistency 220
Did the crime, did the time
what next? 225
7 Commercial and political evolution 231
Hackers for hire 231
Hacktivism 239
Information warfare 245
Cyberterrorism 253
When the boot is on the other foot 261
Preventative measures 269
Vandalizing the information society? 280
Online resources for cybercrime and security 288
Online news sites 288
Security sites 288
Hacker-related sites 290.
Notes:
Includes bibliographical references and index.
ISBN:
0201721597
OCLC:
48025633

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account