1 option
Cybercrime : vandalizing the information society / Steven Furnell.
- Format:
- Book
- Author/Creator:
- Furnell, Steven, 1970-
- Language:
- English
- Subjects (All):
- Computer crimes.
- Physical Description:
- xi, 316 pages : illustrations ; 24 cm
- Place of Publication:
- Boston ; London : Addison-Wesley, 2002.
- Summary:
- This overview of computer-based crime and abuse covers a wide range of crimes and abuses, including those involving hackers and computer viruses. Detailed technical knowledge is not needed and there are examples of incidents that have already occurred.
- Contents:
- 1 "You are here"
- welcome to the information society 1
- The opportunity
- the brave new world 1
- The dependency
- society's reliance upon information technology 11
- The danger
- why we need security 13
- 2 Crime in the information society 21
- What is cybercrime? 21
- Assessing the scale of the problem 26
- Some examples of notable incidents 29
- 3 Hackers
- anti-heroes of the computer revolution? 41
- Who or what is a hacker? 41
- Phreaking out the phone company 45
- Stereotype and self-image 47
- What's the motivation? 52
- Elements of the hacker culture 58
- Hackers as celebrities 77
- 4 Delving deeper
- what hackers do and how they do it 95
- Getting in and staying there 95
- Common forms of attack 102
- Getting the tools to do it for you 116
- Using less technological approaches 136
- 5 Manifestations of malware 143
- What is malware? 143
- Motivations of the malware writers 149
- The evolution of viruses 151
- Notable malware incidents 155
- Causing problems without writing code 177
- Future directions for malware 186
- 6 Societal impacts of cybercrime 189
- Implications for society at large 189
- Public attitudes and awareness 191
- Electronic commerce
- an example of society's need for protection 202
- Policing the problem 207
- Legislating against computer crime and abuse 210
- The problems of enforcing the law 212
- Understanding the issues involved 216
- Global inconsistency 220
- Did the crime, did the time
- what next? 225
- 7 Commercial and political evolution 231
- Hackers for hire 231
- Hacktivism 239
- Information warfare 245
- Cyberterrorism 253
- When the boot is on the other foot 261
- Preventative measures 269
- Vandalizing the information society? 280
- Online resources for cybercrime and security 288
- Online news sites 288
- Security sites 288
- Hacker-related sites 290.
- Notes:
- Includes bibliographical references and index.
- ISBN:
- 0201721597
- OCLC:
- 48025633
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.