Search:

Cyber crime / by Gerdes, Louise I.,1953-;
Includes bibliographical references and index.
Subjects: Computer crimes.;
© c2009., Greenhaven Press,
Available copies: 1 / Total copies: 1
unAPI

Crime on-line : correlates, causes, and context / by Holt, Thomas J.,1978-;
Includes bibliographical references and index.Examines various forms of cybercrime and deviance, discussing fraud, harassment, prostitution, and terror attacks, and looks at the legal and social response to these issues using empirical data and comprehensive overviews of existing research.
Subjects: Computer crimes.;
© c2011., Carolina Academic Press,
Available copies: 1 / Total copies: 1
unAPI

Cyberterrorism / by Grove, Erica,editor.;
Includes bibliographical references and index.Is cyberterrorism distinct from cyberwarfare and other cyberattacks? -- Is cyberterrorism a significant threat? -- Should governments be responsible for preventing cyberterrorism? -- Is it possible to effectively combat cyberterrorism and other cyberattacks? -- Organizations to contact."Anthology of curated articles exploring cyberterrorism and cyber attacks used to create chaos and fear. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it"--
Subjects: Cyberterrorism.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

Cybercrime investigations : The comprehensive resource for everyone / by Bandler, John,author.; Merzon, Antonia,author.;
Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include: Understanding cybercrime, computers, forensics, and cybersecurity Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory Financial investigation Identification (attribution) of cyber-conduct Apprehension Litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.Description based on print version record.Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Subjects: Electronic books.; Computer crimes;
On-line resources: https://ebookcentral.proquest.com/lib/kirtland-ebooks/detail.action?docID=6232191 -- Available online. Click here to access.;
unAPI

Crimedotcom : from viruses to vote rigging, how hacking went global / by White, Geoff,(Journalist),author.;
Meet the hackers -- Fall of the Berlin firewall -- Ocean's 11 dot com -- Digital extortion -- Your data for sale -- Beyond the dark web -- The Internet hate machine -- Lights out -- Weaponizing data -- Hack the vote.In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States' hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war
Subjects: Computer crimes.; Computer security.; Computer crimes; Internet.;
Available copies: 1 / Total copies: 1
unAPI

Organized crime / by Haugen, David M.,1969-; Musser, Susan.; Chaney, Michael.;
Includes bibliographical references (pages 175-177) and index.This title explores whether organized crime presents a threat to the world today, how profitable some organized crime activities are, what policies should be implemented to address organized crime, and whether organized crime has moved to online. - See more at: http://www.cengage.com/search/productOverview.do?Ntt=191910543736754598214609775921354023794&N=197+4294904758&Ntk=P_EPI#sthash.46PB9NSI.dpuf.For over 25 years, the Greenhaven Press Opposing Viewpoints Series has developed and set the standard for current-issue studies. With more than 90 volumes covering nearly every controversial contemporary topic, Opposing Viewpoints is the leading source for libraries and classrooms in need of current-issue materials. Each title explores a specific issue by placing expert opinions in a unique pro/con format. The viewpoints are selected from a wide range of highly respected and often hard-to-find sources and publications. By choosing from such diverse sources and including both popular and unpopular views, the Opposing Viewpoints editorial team has adhered to its commitment to editorial objectivity. Readers are exposed to many sides of a debate, which promotes issue awareness as well as critical thinking. In short, Opposing Viewpoints is the best research and learning tool for exploring the issues that continually shape and define our turbulent and changing world.
Subjects: Organized crime.; Gangs.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

Hate crimes in cyberspace / by Citron, Danielle Keats,1968-;
Includes bibliographical references (pages 257-328) and index.Digital hate -- How the Internet's virtues fuel its vices -- The problem of social attitudes -- Civil rights movements, past and present -- What law can and should do now -- Updating the law to enhance the accountability of harassers -- Extending legal reform to site operators and employers -- "Don't break the Internet" and other free speech concerns -- Silicon valley, parents, and schools.The author examines the controversies surrounding cyber-harassment, arguing that it should be considered a matter for civil rights law and that social norms of decency and civility must be leveraged to stop it. --Publisher's description.In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. She reveals the serious emotional, professional, and financial harms incurred by victims. Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs."Most Internet users are familiar with trolling--aggressive, foul-mouthed posts designed to elicit angry responses in a site's comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims. Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attacker's "revenge porn" were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs. Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it." -- Publisher's description.
Subjects: Cyberbullying.; Cyberstalking.; Hate crimes.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

Hacking and hackers / by Haerens, Margaret.; Zott, Lynn M.(Lynn Marie),1969-;
Includes bibliographical references and index.What is the most effective way to combat hacking? -- Is hacktivism a serious threat? -- What is the significance of Wikileaks? -- What is the role of government in hacking?Presents a collection of essays that examine different points of view about hacking, covering such topics as cybersecurity, hacktivism, the WikiLeaks scandal, and governmental response to cyberwarfare.
Subjects: Computer crimes.; Hackers.; Hacktivism.;
© [2014], Greenhaven Press,
Available copies: 1 / Total copies: 1
unAPI

Hacked : a radical approach to hacker culture and crime / by Steinmetz, Kevin F.;
Includes bibliographical references and index.Public discourse, from pop culture to political rhetoric, portrays the figure of the hacker distinctly: a deceptive, digital villain. But what do we actually know about hackers? In Hacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and situates the practice of hacking within larger political and economic structures of capitalism, crime, and control. This captivating book challenges many of the common narratives of hackers, suggesting that not all forms of hacking are criminal and, contrary to popular opinion, the broader hacker community actually plays a vital role in our information economy. Hacked thus explores how governments, corporations, and other institutions attempt to manage hacker culture through the creation of ideologies and laws that protect powerful economic interests. Not content to simply critique the situation, Steinmetz ends his work by providing actionable policy recommendations that aim to redirect focus from the individual to corporations, governments, and broader social issues. A compelling study, Hacked helps us understand not just the figure of the hacker but also digital crime and social control in our high-tech society.-- Back cover.Acknowledgments -- Introduction: toward a radical criminology of hackers -- Setting the stage -- The front end of hacking -- Craft(y)ness -- On authority and protocol -- The radical turn -- The (hack) mode of production -- Crafting a crackdown -- Conclusion -- Appendix: field research lists -- Notes -- References -- Index -- About the author.
Subjects: Computer crimes; Computer crimes; Hackers.;
Available copies: 1 / Total copies: 1
unAPI

Industry of anonymity : inside the business of cybercrime / by Lusthaus, Jonathan,1984-;
Includes bibliographical references (pages 253-277) and index.Introduction -- From lone wolves to industrialization -- Making sense of the cybercrime industry -- Nicknames and identity -- How cybercriminals cooperate online -- The offline dimension -- Cybercrime, organized crime, and governance -- Conclusion.Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.--
Subjects: Computer crimes.; Hackers.; Online identities.; Organized crime.;
Available copies: 1 / Total copies: 1
unAPI