Cybercrime: Criminal Threats from Cyberspace: Crime, Media, and Popular Culture
Autor Susan W. Brenneren Limba Engleză Hardback – 25 feb 2010 – vârsta până la 17 ani
Preț: 309.38 lei
Preț vechi: 359.56 lei
-14% Nou
Puncte Express: 464
Preț estimativ în valută:
59.21€ • 61.50$ • 49.18£
59.21€ • 61.50$ • 49.18£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780313365461
ISBN-10: 0313365466
Pagini: 296
Dimensiuni: 156 x 235 x 30 mm
Greutate: 0.59 kg
Editura: Bloomsbury Publishing
Colecția Praeger
Seria Crime, Media, and Popular Culture
Locul publicării:New York, United States
ISBN-10: 0313365466
Pagini: 296
Dimensiuni: 156 x 235 x 30 mm
Greutate: 0.59 kg
Editura: Bloomsbury Publishing
Colecția Praeger
Seria Crime, Media, and Popular Culture
Locul publicării:New York, United States
Caracteristici
Detailed descriptions and analysis of real cybercrime cases illustrate what cybercrime is and how cybercriminals operate
Notă biografică
Susan W. Brenner is the NCR Distinguished Professor of Law and Technology at the University of Dayton School of Law, Dayton, OH.
Cuprins
Series ForewordChapter 1. Twenty-First Century Twilight Zone: Stalking a TownChapter 2. From Mainframes to Metaverse: The Origins and Evolution of CybercrimeChapter 3. Three Categories of CybercrimeChapter 4. Target Cybercrimes: Hacking, Malware, and Distributed Denial of Service AttacksChapter 5. Tool Cybercrimes: Fraud, Harassment?.?Murder?Chapter 6. Cyber-CSI: Computer Crime SceneChapter 7. Beyond War Games: Who Are the Cybercriminals?Chapter 8. Cyber-Law and Order: Investigating and Prosecuting CybercrimeChapter 9. U.S. Law Enforcement: Agencies and ChallengesChapter 10. Global Law Enforcement: Few Agencies, Even More ChallengesChapter 11. Privacy versus Security: Which Trumps?Chapter 12. New Ways to Fight CybercrimeNotesIndex
Recenzii
Brenner (law and technology, Univ. of Dayton School of Law) has written an exceptionally clear, well-organizedaccount of the expansion of cybercrime from the playful hackers and 'phone phreaks' of the mainframe era to today'ssophisticated cross-national criminal operations. . . . Recommended. All readers.