e99 Online Shopping Mall
Help | |
Home - Basic C - Computer & Internet Crime (Books) |
  | Back | 21-40 of 100 | Next 20 |
click price to see details click image to enlarge click link to go to the store
21. dotCrime Manifesto: How to Stop Internet Crime, The by Phillip Hallam-Baker | |
Paperback: 415
Pages
(2010-06-13)
list price: US$39.99 -- used & new: US$23.30 (price subject to change: see help) Asin: 0132160382 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Internet crime keeps getting worse...but it doesn’t have to be that way. In this book, Internet security pioneer Phillip Hallam-Baker shows how we can make the Internet far friendlier for honest people—and far less friendly to criminals. The dotCrime Manifesto begins with a revealing new look at the challenge of Internet crime—and a surprising look at today’s Internet criminals. You’ll discover why the Internet’s lack of accountability makes it so vulnerable, and how this can be fixed —technically, politically, and culturally. Hallam-Baker introduces tactical, short-term measures for countering phishing, botnets, spam, and other forms of Internet crime. Even more important, he presents a comprehensive plan for implementing accountability-driven security infrastructure: a plan that draws on tools that are already available, and rapidly emerging standards and products. The result: a safer Internet that doesn’t sacrifice what people value most: power, ubiquity, simplicity, flexibility, or privacy. Tactics and strategy: protecting Internet infrastructure from top to bottom Building more secure transport, messaging, identities, networks, platforms, and more Gaining safety without sacrificing the Internet’s unique power and value Making the Internet safer for honest people without sacrificing ubiquity, simplicity, or privacy Spam: draining the swamp, once and for all Why spam contributes to virtually every form of Internet crime—and what we can do about it Design for deployment: how to really make it happen Defining security objectives, architecture, strategy, and design—and evangelizing them How to Build a Safer, Better Internet You’ll find yourself deeply concerned, then fascinated, then hopeful as you read about • Building an Internet that resists online crime • Phishing, botnets, and spam: tactical, workable, immediate countermeasures • Establishing the “Accountable Web”: a strategic, long-term solution to Internet crime • Improving security without sacrificing what people love about the Internet The Internet is today’s Wild West: too much lawlessness, too little accountability. Now, one of the Internet’s leading pioneers shows how we can build a more trustworthy Internet: one that resists crime without frustrating honest people or compromising privacy and civil liberties. Drawing on years at the cutting edge of Internet and security research, Phillip Hallam-Baker offers a complete plan for reinventing the Internet: a plan that addresses everything from technology to politics and culture. Whether you’re a technology professional, policymaker, or citizen, this book will show you how we can make the Internet better, smarter, and above all, safer. informit.com/aw Preface xix Acknowledgments xxiv About the Author xxviii Chapter 1: Motive 1 Chapter 2: Famous for Fifteen Minutes 37 Chapter 3: Learning from Mistakes 51 Chapter 4: Making Change Happen 81 Chapter 5: Design for Deployment 107 Chapter 6: Spam Whack-a-Mole 119 Chapter 7: Stopping Spam 135 Chapter 8: Stopping Phishing 155 Chapter 9: Stopping Botnets 175 Chapter 10: Cryptography 199 Chapter 11: Establishing Trust 215 Chapter 12: Secure Transport 227 Chapter 13: Secure Messaging 251 Chapter 14: Secure Identity 277 Chapter 15: Secure Names 311 Chapter 16: Secure Networks 323 Chapter 17: Secure Platforms 343 Chapter 18: Law 355 Chapter 19: The dotCrime Manifesto 377 Further Reading 383 References 387 Index 395 Customer Reviews (2)
Understanding the roots of Internet insecurity
Dot Crime Manifseto |
22. I-Way Robbery: Crime on the Internet by William C. Boni CISAMBA, Gerald L. Kovacich CFECPPCISSP | |
Paperback: 256
Pages
(1999-06-01)
list price: US$86.95 -- used & new: US$53.00 (price subject to change: see help) Asin: 0750670290 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
Intellectually Challenging and Practical
Must read book for security and law enforcment professionals |
23. Computer Crimes and Digital Investigations by Ian Walden | |
Hardcover: 600
Pages
(2007-04-09)
list price: US$195.00 -- used & new: US$58.70 (price subject to change: see help) Asin: 0199290989 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
24. Cyber Crime: How to Protect Yourself from Computer Criminals by Laura E. Quarantiello | |
Paperback: 144
Pages
(1996-12)
list price: US$13.56 -- used & new: US$3.95 (price subject to change: see help) Asin: 0936653744 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
Too short on solution
Wonderful |
25. Cyber Crime (Opposing Viewpoints) by Louise Gerdes | |
Paperback: 213
Pages
(2008-11-07)
list price: US$39.70 -- used & new: US$31.84 (price subject to change: see help) Asin: 0737742003 Canada | United Kingdom | Germany | France | Japan | |
26. Computer and Intellectual Property Crime: Federal and State Law by A. Hugh Scott | |
Hardcover: 1510
Pages
(2001-11-01)
list price: US$275.00 -- used & new: US$275.00 (price subject to change: see help) Asin: 1570182620 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Computer and Intellectual Property Crime gives you detailed federal and 50-state coverage of cybercrime law by examining each statute to provide text and analysis of key statutory language, then examine elements of the crimes, classifications of offenses under each statute, penalties, remedies available to victims, sentencing guidelines for corporate defendants, seizure of data and files, triggers of other liability, federal enforcement tools, restitution, and case law developments. Customer Reviews (1)
Great book, bad timing. |
27. Does the Internet Increase the Risk of Crime? (At Issue Series) by Lisa Yount | |
Paperback: 109
Pages
(2005-07-22)
list price: US$22.50 -- used & new: US$19.12 (price subject to change: see help) Asin: 073772708X Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
28. Intellectual Property and Computer Crimes (Intellectual Property Law and Business Crimes Series) by Peter Toren | |
Ring-bound: 500
Pages
(2003-07-26)
list price: US$289.00 -- used & new: US$270.00 (price subject to change: see help) Asin: 1588521184 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
29. Internet (Global Viewpoints) by Gary Wiener | |
Paperback: 270
Pages
(2010-06-29)
list price: US$26.50 -- used & new: US$26.50 (price subject to change: see help) Asin: 0737749369 Canada | United Kingdom | Germany | France | Japan | |
30. Scene of the Cybercrime: Computer Forensics Handbook by Debra Littlejohn Shinder | |
Paperback: 749
Pages
(2002-08-10)
list price: US$59.95 -- used & new: US$59.95 (price subject to change: see help) Asin: 1931836655 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (17)
<Yawn> Tell Me Something I Don't Already Know
Handy little book
Neither Fish Nor Fowl
So very good on so many levels... Most books on computer and network security are written for the techie trying to secure their assets from outside attack.Obviously, there's a huge need for that information.But it seems that there is virtually nothing written from the law enforcement perspective on computer security.That's a major problem in two ways...For one, there are too few law enforcement personnel that understand exactly what cybercrime is and how it can be detected, fought, and prosecuted.That's probably the audience that would benefit most from this book.Second, most technical personnel don't know what to do in order to successfully build a case and prosecute an attacker once an intrusion has occurred.That's the other audience that will gain the most from reading Shinder's work. The book includes the following chapters:Facing the Cybercrime Problem Head On; Reviewing the History of Cybercrime; Understanding the People on the Scene; Understanding Computer Basics; Understanding Network Basics; Understanding Network Intrusions and Attacks; Understanding Cybercrime Prevention; Implementing System Security; Implementing Cybercrime Detection Techniques; Collecting and Preserving Digital Evidence; Building the Cybercrime Case The hardcore network security administrator will probably already know most of the information in the "Understanding..." chapters.But unless they are adept or experienced in forensic analysis, the last three chapters will be crucial information for them.Without the knowledge of how to preserve evidence, there's a good chance that you'll never have the satisfaction of seeing your attacker prosecuted.Higher level managers of a corporate security department will find all of this information useful, as they may not be as hands-on as the administrators and may not understand what threats and risks are present in today's environment. From the law enforcement perspective, it's all good.Fighting cybercrime is so different than regular law enforcement.This is the perfect volume to give the budding cybercop all the information they need to get up to speed with how crime is conducted electronically.I would recommend that this book be required reading for law enforcement and prosecution personnel. The book is well written with plenty of real-life examples of criminal activities and legal scenarios.It's one of the most engrossing technical reads I've had in awhile.A definite recommended read...
Generic Information Security reading. |
31. Intelligence and Security Informatics: European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings (Lecture Notes in Computer ... Applications, incl. Internet/Web, and HCI) | |
Paperback: 277
Pages
(2008-12-12)
list price: US$69.95 -- used & new: US$51.52 (price subject to change: see help) Asin: 3540898999 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, held in Esbjerg, Denmark, in December 2008. The 23 revised full papers and 2 revised poster papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on criminal and social network analysis, intelligence analysis and knowledge discovery, Web-based intelligence monitoring and analysis, privacy protection, access control, and digital rights management, malware and intrusion detection, as well as surveillance and crisis management. |
32. Crime, Criminal Justice and the Internet (Special issues) | |
Paperback: 91
Pages
(1998-12-17)
Isbn: 042166990X Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
33. To Surf & Detect: Crime and Punishment on the Internet (Go! Guides Series) by Dennis E. Bolen | |
Paperback:
Pages
(1996-04)
list price: US$10.95 -- used & new: US$10.95 (price subject to change: see help) Asin: 1577120043 Canada | United Kingdom | Germany | France | Japan | |
34. Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series) by John R. Vacca | |
Paperback: 600
Pages
(2002-06-15)
list price: US$39.95 -- used & new: US$1.98 (price subject to change: see help) Asin: 1584500182 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description KEY FEATURES * Comprehensive overview of the subject from definitions to data recovery techniques to auditing methods to terrorist cyber-attacks * Case studies and vignettes of actual computer crimes * Selected Topics: Computer Forensics Fundamentals; Data Recovery; Evidence Collection And Data Seizure; Duplication And Preservation Of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the US Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tacking; The Individual Exposed; Case Studies and Vignettes * CD includes tools, presentations, and demos of the latest computer forensics software, including partition images from The Forensic Challenge On the CD-ROM: The following forensic tools, demos, and presentations are included on the accompanying CD-ROM. The Forensics Challenge Partition Images On the other hand, though Vacca gives good general advice (don't lose volatile information by shutting a compromised machine down midattack; do be prepared to translate memory dumps into jury-readable form), he sometimes meanders into generalizations and irrelevancies. The fact that terrorists distribute their plans via public Web sites is certainly scary, but hardly helpful to someone wanting to prosecute the guy who vandalized the corporate Web site. Similarly interesting, but practically irrelevant to most of us, are discussions of high-energy radio frequency (HERF) and electromagnetic pulse (EMP) weapons that can knock out information systems from a distance. More focus on evidence collection in organizational computing environments would make this book useful, rather than just generally informative. --David Wall Topics covered: How to gather evidence of a hack attack after the fact, and a lot of general-interest information on the state of crime and law enforcement in computer technology. Coverage is almost all general in nature, dealing with how to formulate a strategy and deal with events without getting into details of any operating system or computing environment. Customer Reviews (42)
Deceptive title, very little forensic information
In the field of computer forensics
Little or nothing for the practitioner or serious student
Okay but I was disappointed
New/updated info is spot on! |
35. Handbook of Internet Crime | |
Paperback: 654
Pages
(2010-01)
list price: US$59.95 -- used & new: US$49.68 (price subject to change: see help) Asin: 1843925249 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
36. TANGLED WEB: Tales of Digital Crime from the Shadows of Cyberspace by Richard Power | |
Hardcover: 431
Pages
(2000-09)
list price: US$25.00 -- used & new: US$1.49 (price subject to change: see help) Asin: 078972443X Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This is not to say that Tangled Web is inaccurate or strongly biased. The author gives credit, where it is due, to law enforcement agencies and security consultants who have made some genuine progress in preventing crime and apprehending criminals. Fortunately, it's tough, as of yet, to commit violent crimes over a network, but the reader still will find reason to think twice before glossing over security procedures, even at home. Power provides example countermeasures for all desired levels of connection, value, and privacy; and, while some are out of reach of individuals and smaller businesses, others cost only a little time or convenience. As with health insurance, it's better to take care of it beforehand, and Tangled Web should inspire even the most confident reader to action. --Rob Lightner Customer Reviews (16)
Great Summary...Too Long...Somewhat Outdated
Really good book to give a manager It tells stories of what happens when you don't do security right without getting too technical.
Intriguing, Thought-Provoking, and Compelling! Tangled Web discusses the roles of computer, Internet, and telecommunications technologies in the realm of computer crime - including pornography, identity theft, hacking, credit card data theft, altering Web pages, deliberate shutting down of services, fraudulent money transfers, worm and virus infections, and sabotage carried out by disgruntled employees. Actual accounts of real people perpetrating such crimes, including interviews, drives home the impact that criminal computer activity can have on the lives of so many other people. Power describes in detail the kind of people involved in committing computerized crime - their motivations, how they go about their work, some of the law enforcement strategies involved in catching them, and the consequences of their actions - including monetary losses, downtime, and threats to human safety. The book contains a helpful glossary of terminology specifically related to computer crime. A listing of resources provides readers with a wealth of additional information about computer crime, threats to online privacy, and measures that can be taken to help prevent future breaches of safety and security. Inclusion of the Computer Fraud and Misuse Act and other U.S. laws and treaties spells out the serious nature of criminal computer crime and some of the steps the federal government has taken to discourage further criminal activity. I found the book quite chilling. I couldn't easily put it down. Anyone familiar with Simson Garfinkel's Database Nation (O'Reilly & Associates), will find this book thoroughly intriguing, thought-provoking, and compelling reason enough to take more serious measures to protect their computer systems and data against possible attack. Extraordinary reading and relevant to our culture today!
Good resources but just okay...... If one knows nothing on the subject and wants to hear "the inside scoop" on a number of news stories, it is an okay start.To my mind, the best part of the book were the appendices and the references to other resources throughout the book - those other resources are a lot more valuable than the text in the book itself.
A real eye opener on Digital weakness |
37. Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors by Anthony Reyes, Richard Brittson, Kevin O'Shea, James Steele | |
Paperback: 432
Pages
(2007-04-04)
list price: US$59.95 -- used & new: US$49.99 (price subject to change: see help) Asin: 1597491330 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
38. The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals by Paul Bocij | |
Hardcover: 272
Pages
(2006-10-30)
list price: US$44.95 -- used & new: US$21.08 (price subject to change: see help) Asin: 027598575X Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home.As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home.As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes.Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm.But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms.With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim. Customer Reviews (1)
A 'must' not just for college-level collections strong in social issues or crime prevention |
39. Netspionage: The Global Threat to Information by William C. Boni CISAMBA, Gerald L. Kovacich CFECPPCISSP | |
Paperback: 280
Pages
(2000-09-25)
list price: US$50.95 -- used & new: US$15.00 (price subject to change: see help) Asin: 0750672579 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (7)
Great book!
How to best protect and secure information
Wow, is this book poorly written.
A waste of money I would guess that these slides were used to great effect several years ago to stunned senior managers of companies still figuring out what the Internet meant.But in 2001, most people are beyond needing this explained to them.To give an idea of the target audience, one of the slides is titled something like "Historical Development of Information Technology" and includes "Invention of Abacus - 3,000 B.C."Is that big picture and patronizing enough for you? How about page after page explaining what the Internet is and revelations like "Other companies can use the Internet to do bad things.Like gather information about YOUR company." "Other companies may try to STEAL your information".Etc. etc. etc., mostly filler (probably the filler they used to fill out the time giving the presentation)A saving grace would have been if the authors had annecdotes of real instances of "Netspionage", or other "inside" experiences to impart, but most of the concrete examples they give appear to be from published cases.So, if you already know what the Internet is and that IT security is imporant, don't bother.If you don't know either of these things, buy a book about the Internet and remember, IT security is imporant.
I'll bet Tom Clancy read this book. |
40. Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings (Lecture Notes in Computer Science ... Applications, incl. Internet/Web, and HCI) | |
Paperback: 330
Pages
(2007-05-03)
list price: US$69.95 -- used & new: US$33.10 (price subject to change: see help) Asin: 3540715487 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007. The 18 revised full papers, 14 revised short papers, and extended abstracts of 10 poster papers presented were carefully reviewed and selected from 159 submissions. The papers are organized in topical sections on crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis, network security and intrusion detection. |
  | Back | 21-40 of 100 | Next 20 |