1 option
Cybercrime : an encyclopedia of digital crime / Nancy E. Marion and Jason Twede.
- Format:
- Book
- Author/Creator:
- Marion, Nancy E., author.
- Twede, Jason, author.
- Series:
- Gale eBooks
- Language:
- English
- Subjects (All):
- Computer crimes.
- Computer crimes--Prevention.
- Physical Description:
- 1 online resource (pages)
- Edition:
- First Edition.
- Distribution:
- London : Bloomsbury Publishing (UK), 2024
- Place of Publication:
- Santa Barbara : ABC-CLIO, 2020.
- Summary:
- "This title has been through a marketing launch meeting and the information in this transmittal form has been approved." Provided by publisher.
- Contents:
- Abandonware
- Abene, Mark
- Advanced persistent threats
- Advanced Research Projects Agency Network
- Adware
- Anonymous
- Ashley Madison breach
- Assange, Julian
- Auernheimer, Andrew Alan Escher
- Awareness
- Backdoor
- Banking attacks
- Biometrics
- Bitcoin
- Black-Hat hackers
- Blankenship, Loyd
- Bots and botnets
- Bypass
- Calce, Michael
- CAN-SPAM Act of 2003
- Capital One breach
- Carberp
- Center for Internet Security
- Chaney, Christopher
- Chaos Computer Club
- Child pornography
- China
- Cleary, Ryan
- Code red
- Comprehensive National Cybersecurity Initiative
- Computer Fraud and Abuse Act of 1986
- Continuous Diagnostics and Mitigation (CDM)
- Copyright infringement
- Corporate account takeover
- Costs of cybercrime
- Council of Europe Cybercrime Convention
- Cracker and cracking
- Craigslist killers
- Credit card fraud
- Cryptocurrency
- Cryptography
- Cyberbullying
- Cybersecurity
- Cybersecurity Act of 2012
- Cybersecurity and Infrastructure Security Agency (CISA)
- Cybersecurity Enhancement Act of 2014
- Cybersecurity Workforce Assessment Act of 2015
- Cybersquatting
- Cyberstalking
- Cyber-Surveillance malware
- Cyberterrorism
- Cyberwarfare
- Dark web
- Data leakage
- Data sovereignty
- DEF CON
- Denial-of-service attack (DoS)
- Department of Defense, attacks on
- Digital currency
- Digital Millennium Copyright Act
- Digital rights management
- Digital signatures
- Distributed Denial-of-Service Attack (DDoS)
- Domain name system cache poisoning
- Doxing
- Draper, John
- Dread Pirate Roberts (Ulbricht, Ross; 1984-)
- Dreamboard
- Drink or Die
- Drug trafficking
- Dumpster diving
- Economy, effects on
- Einstein
- Electronic Frontier Foundation
- E-mail bomb
- E-mail-related crimes
- Encryption
- End user license agreement
- Engressia, Josef Carl, Jr.
- Entertainment, effects on
- Equifax breach
- Ethics
- European Cybercrime Center
- Exploit kit
- Federal Bureau of Investigation
- Federal Information Security Management Act of 2002
- Financial crimes
- Firewall
- Florida Computer Crime Act of 1978
- 414s
- Fraud
- Gambling
- GameOver Zeus Botnet
- globalHell (gH)
- Hacker and hacking
- Hacktivism
- Hate crime
- Health care, effects on
- Hijacking
- Identity theft
- ILOVEYOU virus
- Immigration and Customs Enforcement
- Insurance
- International issues
- Interpol
- Keystroke monitoring
- Legion of Doom
- Legislation
- Levin, Vladimir
- Lizard Squad
- Lloyd, Timothy
- Logic bomb
- LulzSec
- Malware
- Manning, Chelsea
- Masters of deception
- Melissa Worm
- Mitnick, Kevin
- Money laundering
- Morris, Robert Tappan
- Motives
- MPack
- Nakamoto, Satoshi
- National Cyber Investigative Joint Task Force
- National Cybersecurity Alliance
- National Cybersecurity and Critical Infrastructure Protection Act of 2013
- National Institute of Standards and Technology Cybersecurity Framework
- News corp hacking
- Nimda
- North Korea
- Open-Source
- Operation Apothecary
- Operation Aurora
- Operation Innocent Images
- Operation Marco Polo
- Operation Olympic Games
- Operation Phish Phry
- Operation Shrouded Horizon
- Password
- Payload
- Pen register
- People's Liberation Army Unit 61398
- Personal Data Notification and Protection Act of 2017
- Personally identifying information
- Pharming
- Phishing
- Phreaker
- Piggybacking
- Pile, Christopher
- Plankton
- Pokémon Go
- Political uses
- Poulsen, Kevin
- President and cybercrime
- Pretty Good Privacy
- Prevention
- Prism
- Privacy
- Profits from cybercrime
- Public domain
- Punishment
- Ransomware
- Reputation, effects on
- Revenge porn
- Rootkit
- Russia
- Russian Business Network
- Scavenging
- Secret Service
- Sexting
- Silk Road
- Simulation
- Skimmer
- Smart Card
- Sniffer
- Snowden, Edward
- Social engineering
- Social media
- Sony Pictures Entertainment hack
- Spam
- Spoofing
- Spyware
- State actor
- Storm Botnet
- Supervisory Control and Data Acquisition
- Superzapping
- Swartz, Aaron
- Swatting
- Symantec
- Syrian Electronic Army
- TeaMpoisoN
- Tools
- Tor (The Onion Router)
- Trojan horse
- Uber hack
- Union Dime Savings Bank Theft
- United Loan Gunmen
- United States Cyber Command
- Unlimited Operation
- U.S. Presidential Election Interference, 2016
- Vandalism
- Victims of cybercrime
- Virtual Private Network
- Virus
- Vulnerability
- War Dialer
- Wardriving
- Welchia Worm
- White-Hat Hackers
- WikiLeaks
- Women, effects on
- Worm
- Youth and cybercrime
- Zero-Day attacks.
- Notes:
- Includes bibliographical references and index.
- Description based on print version record and CIP data provided by publisher; resource not viewed.
- ISBN:
- 9798400636547
- 9798216070603
- 9781440857355
- 1440857350
- OCLC:
- 1141021467
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.