e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Basic C - Computer & Internet Crime (Books)

  Back | 41-60 of 100 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

click price to see details     click image to enlarge     click link to go to the store

$18.11
41. Virtual Danger: Staying Safe Online
$1.95
42. Internet Predator
$153.79
43. Issues in Internet Law: Society,
$7.26
44. Net Crimes & Misdemeanors:
$152.88
45. Cyberlaw for Global E-business:
46. Stay Safe in Cyberspace: Kids'
$173.93
47. Cases on Technologies for Teaching
$59.00
48. The Computer and Internet Fraud
$50.87
49. Principles of Cybercrime
$20.26
50. The Internet and Crime (Point/Counterpoint)
$39.99
51. How to Not Get Burned By Internet
$29.83
52. Cybercrime: Investigating High-Technology
$273.49
53. Handbook of Research on Computational
$3.15
54. High-Tech Crimes Revealed: Cyberwar
$69.48
55. Cyber-crime: The Challenge in
$38.89
56. Trust and Crime in Information
 
$175.95
57. Corporate Hacking and Technology-Driven
$8.99
58. Cyber Crime (True Crime)
 
$9.95
59. Ultimate Internet Terrorist: How
$9.00
60. Fatal System Error: The Hunt for

41. Virtual Danger: Staying Safe Online (What's the Issue?)
by Anne K. Brown
Library Binding: 48 Pages (2009-08-15)
list price: US$27.99 -- used & new: US$18.11
(price subject to change: see help)
Asin: 0756542510
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

The birth of the Internet revolutionized communication, information, social networking, shopping and crime. Thieves, predators, and bullies have all made the Internet their new pipeline to find victims. Part of the What’s the Issue? series, Virtual Danger Keeping Safe Online explores the tricks that criminals use to prey on unsuspecting Web users and identifies ways to avoid becoming a victim. Personal stories, quizzes, and places to get help are included.

... Read more


42. Internet Predator
by Karl Schwartz
Paperback: 123 Pages (1999-06)
list price: US$17.95 -- used & new: US$1.95
(price subject to change: see help)
Asin: 0879471913
Canada | United Kingdom | Germany | France | Japan

43. Issues in Internet Law: Society, Technology, and the Law, 2008 edition (Issues in Internet Law: Society, Technology, & the Law)
by Keith B. Darrell
Paperback: 436 Pages (2007-10-21)
list price: US$69.95 -- used & new: US$153.79
(price subject to change: see help)
Asin: 0977161145
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
The 2008 edition of Issues In Internet Law: Society, Technology, and the Law has been updated with more than 100 pages of the latest cases and trends in Internet Law. Advances in technology have always changed societies, and there has never been as far-reaching and profound an advance as the Internet. Suppose you buy something online; was that online contract you clicked on really enforceable, even if you just scrolled down and did not read it? Is receiving pornography in office e-mail from your co-workers sexual harassment? Can stalkers find your personal information online? What can you legally place on your website? And what's not allowed? Do you own your domain name? Can a public library censor your use of its Internet-linked computers? Who else can read your e-mail? Is it legal to gamble online? How "private" is your private information after you disclose it to a website? Is a student exercising his First Amendment rights when he creates a hate website on a public school's Internet server? Do other countries address these issues differently from the U.S.? Which country's laws apply on the Internet? These are just some of the issues addressed in this book. Issues In Internet Law: Society, Technology, and the Law can be read by the average person to develop an awareness of issues in Internet Law and is also designed for use as a textbook. ... Read more

Customer Reviews (1)

5-0 out of 5 stars Top-notch and to the point for the layman
This is a top-notch book written for the webmaster. Although it deals with the complex legal issues surrounding the internet, it is written in layman's terms and illustrated with "ripped from the headlines" court cases.

Anyone creating a website, blog or overseeing one should read this book first. ... Read more


44. Net Crimes & Misdemeanors: Outmaneuvering the Spammers, Swindlers and Stalkers Who Are Targeting You Online
by Jayne A. Hitchcock
Paperback: 350 Pages (2002-08)
list price: US$24.95 -- used & new: US$7.26
(price subject to change: see help)
Asin: 0910965579
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
As the number of Web users continues to swell, so do the numbers of online opportunists, con artists, miscreants, and psychopaths. Recognizing this danger, this book provides a reader-friendly guide that helps Web users identify, avoid, and survive online predators and protect their families. Detailing a broad range of abusive practices, ordinary PC users will share in victims' stories and advice on how to handle junk e-mail, "flaming," privacy invasion, financial scams, cyber stalking, and identity theft. Provided are tips, strategies, and techniques that can be put to immediate use, as well as laws, organizations, and Web resources that can aid victims and help them fight back. ... Read more

Customer Reviews (13)

4-0 out of 5 stars 2nd Edition Is Even Scarier
I just received the 2nd edition, and Hitchcock has again put the fear of the virtual world in me. Her examples and discussion is certainly eye-opening as to what or who is lurking out there.

Not only is this a good read, but it is also a great reference for high school and undergraduate college. The examples and resources made it a valued purchase for me.

3-0 out of 5 stars Useful for the uninitiated
One of the hook lines for this book states, "..an insightful book that is a must read for everyone who owns a computer". No it isn't! The number of people who have not heard anything about computer viruses, identity theft, hackers or at least some form of computer attack must surely be a small minority by now. Even the most non-mechanicalof drivers know something about oil, where the gas goes, tire pressures, etc. even if they only ever turn the ignition key and point their vehicle in the direction they want to go. Why then, would someone who owns a computer and surfs the internet assume all it involves is turning on their computer, getting an internet connection and pointing and clicking? This book is for those people.

It does a good job at highlighting the pit falls, traps and virtual land mines waiting for the unprotected, ignorant or just plain stupid. The book also gives good advice on what to do if harassment gets out of hand. However, the sub-title of "Outmaneuvering the spammers, swindlers and stalkers" is somewhat misleading. The outmaneuvering techniques described are basically don't go to chat rooms, news groups or message forums where people take a virtual swipe at you. The passages about outmaneuvering the spammers also seems incredibly naive and is centered around displaying the full header of an email so you'll know who sent it. Wrong! Some mention is made of how return email addresses can be faked, but so too can IP addresses. Complaining to an ISP about spam, especially one which knowingly hosts spamming operations, is a waste of time. Even more so if they originate somewhere in Asia like a lot of them do. Then we have the anonymous emailing web sites and of course the spammers favorite, the zombie computer which they use to re-direct their emails without the computer owner's knowledge.

If you're looking for a technical reference which tells you how to protect yourself online, what tools to use, what they do and why you need them, this book isn't for you. However, if you're concerned about internet horror stories, online safely and are not particularly computer or internet savvy, this book will be useful to you and you'll learn much about the dos and don'ts of life online.

5-0 out of 5 stars Everyone who uses the Internet should read this book!
This book is jam packed with good information about online stalking, online shopping, protecting your identity, etc.As technology becomes more advanced, there are more and more ways for people to become victims of Internet crime.Jayne Hitchcock explains the steps to take if this ever happens to you and ways to prevent it so it never does!

An excellent read - AND you don't have to be a computer genius to understand all of her technical information!

4-0 out of 5 stars Very, very useful, and a good read!
Ms. Hitchcock outlines the major threats to Internet privacy and safety we face in a clear, easy-to-read, and very comprehensive manner. Although the book caters more to the novice Web surfer than it does the technologically adept, even hardcore geeks will be impressed at how she takes stories of cyberstalking, spoofing, auction fraud, and flame wars and puts human faces on all of them.

Though message boards and newsgroups have been replaced with blogs and MySpace, the basic principles of being smart and protecting yourself when you go online are even more important, and Hitchcock reminds us that no matter how smart or savvy you think you are, you can end up a victim of "Net Crimes", unless you pay attention.

Definitely recommended.

5-0 out of 5 stars EXCELLENT GUIDE TO ONLINE SELF-PROTECTION
Net Crimes is an outstanding source of information to learn how to protect yourself while online.It thoroughly covers many topics and addresses several issues that you may not realize put you at risk.After reading it, I am "kicking myself" for things I have inadvertently done online that could have caused some potential problems. I will now be much more cautious about websites I visit and personal information that I provide to them. ... Read more


45. Cyberlaw for Global E-business: Finance, Payment and Dispute Resolution (Premier Reference Source)
by Takashi Kubota
Hardcover: 318 Pages (2007-12-18)
list price: US$180.00 -- used & new: US$152.88
(price subject to change: see help)
Asin: 1599048280
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
As the various types of global e-business grow rapidly, the need to establish adequate cyberlaws is increased. Reformation of domestic and global laws has been underway; however, the nature of e-business is one of constant technological developments, consistently outdating existing laws.

Cyberlaw for Global E-Business: Finance, Payments & Dispute Resolution examines cyberlaw discussions worldwide on topics such as cybercrime and risk management, comparative electronic trading systems of securities, digital currency regulation, jurisdiction and consumer protection in cross-border markets, and case law on international bank transfers. An invaluable resource for policy-makers, business experts, lawyers, scholars, and researchers, this book provides comprehensive research from a global perspective on the legal, technical, and financial implications of e-business. ... Read more


46. Stay Safe in Cyberspace: Kids' Guide
by Victoria Roddel
Paperback: 140 Pages (2002-11)
list price: US$14.95
Isbn: 0972213538
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
A reference manual that provides the fundamentals of online and computer safety for ages 6-13. Major topics include fraud, infectors, strangers, home computer security, passwords and instant messaging. ... Read more


47. Cases on Technologies for Teaching Criminology and Victimology: Methodologies and Practices (Premier Reference Source)
by Raffaella Sette
Hardcover: 287 Pages (2009-10-15)
list price: US$225.00 -- used & new: US$173.93
(price subject to change: see help)
Asin: 1605668729
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
As the explanation of crime and the social reaction to it depends on historical and cultural contexts, didactic methodologies are subject to continuous change in relation to theories and needs strictly linked to the profession. Cases on Technologies for Teaching Criminology and Victimology: Methodologies and Practices presents state-of-the-art research and teaching into the study of corruption and those affected by it, containing chapters authored by researchers, academic professors, and experts from all over the world. With examinations into real-life situations, this unique publication analyzes the benefits and disadvantages of various teaching methodologies in universities, police academies, and crime victim services. ... Read more


48. The Computer and Internet Fraud Manual
by Joseph T. Wells, Association of Certified Fraud Examiners
Paperback: 171 Pages (2004-01-01)
list price: US$59.00 -- used & new: US$59.00
(price subject to change: see help)
Asin: 1889277363
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

It is important for business management to understand how computer fraud and manipulation is accomplished and what security measures should be instituted to prevent it. The Computer & Internet Fraud Manual provides simple, easy-to understand information about how computers are vulnerable to fraud and what you can do to protect yourself and your company.

Covering topics like e-mail abuse and security, Internet and e-commerce fraud, and legal issues regarding computer fraud, this manual contains technology basics that every anti-fraud professional should know.

Highlights include:

  • Legal elements of computer fraud
  • Destruction and manipulation of data
  • Intrusions and viruses
  • Common computer fraud schemes
  • E-mail and e-mail monitoring
  • Internet fraud and hacking
  • E-Commerce fraud
  • Prosecution of fraud perpetrators and working with law enforcement
  • Applications and systems security
  • Implementing computer and information security policies

... Read more

Customer Reviews (2)

5-0 out of 5 stars This computer geek loves this book!!
I took the Certified Fraud Examiners course in Austin and whilst I was there, I purchased about 5 books, this being one of them. It's amazing how many ways we can be victims of fraud on the internet, how to recognize it, how to prevent it and how to deal with it when it happens. I also had the pleasure to meet the author himself, Joe Wells. He told us stories of his days as a FBI agent working the Watergate scandal to never being invited to parties and the story behind the earring in his ear. I knew his books would be just as interesting and easy to learn and understand as his stories about his life were. He is the man who founded the Association of Certified Fraud Examiners. This book compliments my job as a computer forensic examiner nicely. This book has helped me and added value to my purpose in teaching people the vulnerabilities of the internet and finding fraud on a hard drive.

5-0 out of 5 stars Covers fundamentals and professional standards
This short (171-page) book is published by the Association of Certified Fraud Examiners and provides an approach to identifying and preventing computer fraud that is consistent with that organization's body of knowledge and practices.

Part I, "Understanding and Identifying Computer Fraud" consists of none chapters that begin with a discussion of the legal issues and factors associated with computer fraud, technical fundamentals that include common threats (intrusions, viruses, fraud schemes and hacking), and specific topics about internet and e-commerce fraud.

Part II covers detecting and preventing computer fraud, with excellent material on how to properly handle evidence and work with law enforcement professionals during the response phase.This section also contains a brief treatment of applications and systems security, and detailed chapters on security auditing and implementing policies.

While this book is not especially comprehensive, it does cover the major topics that need to be taken into consideration if you're involved in corporate fraud management, but are not familiar with the technical basics of computer and internet fraud.It is also an excellent resource for the IT security professional who may be knowledgable of IT security practices, but not well versed in fraud detection and prevention. ... Read more


49. Principles of Cybercrime
by Jonathan Clough
Paperback: 504 Pages (2010-06-28)
list price: US$59.00 -- used & new: US$50.87
(price subject to change: see help)
Asin: 0521728126
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. ... Read more

Customer Reviews (1)

5-0 out of 5 stars An excellent and all encompassing work
This is an excellent and extremely useful guide.

It covers the many different facets of cybercrime, from fraud to crimes against the person, and from offences where the computer is the tool to those where it is the target.It encompasses the law in a variety of english speaking jurisdictions.

It handles highly complex and diverse subject material in a clear and well structured fashion while maintaining the highest academic standards.It references the key players working in the area effectively.

The book is well presented, clearly set out and easy to read. ... Read more


50. The Internet and Crime (Point/Counterpoint)
by Alan Marzilli
Library Binding: 120 Pages (2009-11-30)
list price: US$35.00 -- used & new: US$20.26
(price subject to change: see help)
Asin: 1604135069
Canada | United Kingdom | Germany | France | Japan

51. How to Not Get Burned By Internet Dating and Mail Order Brides: A Guide for the Potential Victim (Volume 1)
by Anthony Paul Penoso
Spiral-bound: 68 Pages (2007-06)
-- used & new: US$39.99
(price subject to change: see help)
Asin: B000MT9YOW
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
A Legal Treatise and Most Comprehensive Guide to the Internet Dating Sites like Myspace, Match, Yahoo, Messenger, AOL, Udate, Kiss, Friendfinders, Metrodate, Americansingles, eHarmony, Loveaccess, Mate1, and more... Sample Scam/Spam letters, United States law on Visa Immigration, Fiancee petitions, Analysis of Sponsoring a Foreign Spouse, Mail Order Brides Analysis, Financial Consequences visavis Alimony and Divorce, Internet Fraud, Passport Fraud, Visa Fraud, New Passport Travel Rules, Visa Lottery, Eastern European Immigration, Other Cyber Crimes, On-Line Dating, Obtaining Internet Protocol Addresses, Tips on Filing Suit, Penalties for Visa Fraud, Ukrainian Mail Order Bride, How to Prevent Being Burned, Arsenal of Defense Mechanisms, Glossary of Web Terms, What to do If You are Approached in Real Time?, Immigration Forms, and more... ... Read more


52. Cybercrime: Investigating High-Technology Computer Crime
by Robert Moore
Paperback: 285 Pages (2006-06-15)
list price: US$51.95 -- used & new: US$29.83
(price subject to change: see help)
Asin: 1593453035
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective. It presents clear, concise explanations for students and professionals, who need not be technically proficient to find the material easy-to-understand and practical.


The book begins by identifying and defining the most prevalent and emerging high-technology crimes - and exploring their history, their original methods of commission, and their current methods of commission. Then it delineates the requisite procedural issues associated with investigating technology-assisted crime. In addition, the text provides a basic introduction to computer forensics, explores legal issues in the admission of digital evidence, and then examines the future of high-technology crime, including legal responses.




  • Chapters include review questions, further reading, online resources.
... Read more

53. Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions (Handbook of Research On...)
by Chang-Tsun Li
Hardcover: 595 Pages (2009-11-27)
list price: US$295.00 -- used & new: US$273.49
(price subject to change: see help)
Asin: 1605668362
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary readership ranging from academic and professional research communities to industry consultants and practitioners. ... Read more


54. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front
by Steven Branigan
Paperback: 448 Pages (2004-09-06)
list price: US$34.99 -- used & new: US$3.15
(price subject to change: see help)
Asin: 0321218736
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Stories about hacking, stolen credit card numbers, computer viruses, andidentity theft are all around us, but what do they really mean to us? The goal ofthis book, quite simply, is to help educate people on the issues with high-techcrimes, to help answer that question. The goal being not to only talk aboutthese issues, but understand them.There are many books on the market that explain how hackers exploitcomputer and networks. They explain the details of the exploits and methodsto protect against them, and as such are targeted for those with strong technicalknowledge. That is *not* the case here. Readers will not learn the intricacies ofthe latest hacking attack. Readers will learn how hackers use these exploits, whythey use them, and in some cases how they get caught.With Branigan's background as a sworn law-enforcement officer (cop), systemadministrator (geek), computer programmer (geek), Internet security consultant(geek with tie), and network security researcher (geek in shorts), he offers aunique perspective to help people better understand the many issues with hightechcrime and how they might be affected. ... Read more

Customer Reviews (8)

3-0 out of 5 stars It's ok for a newbie.
The great cover art plus the title led me to believe that exciting stories were inside.The most exciting chapter is the one you can read for free on the author's webpage, from there it doesn't get much better.

If you've been online for any time at all, you'll be familiar with better material.The charts and graphs in the latter part of the book don't give the reader enough information in most cases to determine the validity of the information or to make sense of it.I think some of the information was cherry-picked to go along with the flow of the chapters.

The writer's style can be tedious to read in that the sentences are twisted and often run-on.For example, "How can we determine, before an attack, what it is most likely, that a hacker will attack?" After a few dozen sentences like that one, you'll start to laugh!

I found Clifford Stoll's dated work, "The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage" a much more exciting read.

5-0 out of 5 stars Documenting a new frontier of the war against terrorism
Author Steven Branigan is involved with many real incidents of high-tech crimes, and in High-Tech Crimes Revealed: Cyberwar Stories From The Digital Front provides details on how to find out what actually takes place in such crimes. From the specific abuses of computers and technology to the legal and social concerns often overlooked in cyber-crimes, Branigan's collection of real-world cyberwar stories is enlightening - and frightening, documenting a new frontier of the war against terrorism.

5-0 out of 5 stars Great book for management
High-Tech Crimes Revealed is a great book for management.

The stories are real, written in non-technical language.

Makes for very interesting reading.

5-0 out of 5 stars Teaching security through stories
I really enjoyed this book, first for it's technical content, as you would expect. Then second as a set of interesting stories about security. And it's these stories that bring security issues to life.

This is not a reference book. The technical content is related directly to the stories and case studies. But the technical content is still very compelling, well written and in-depth.

If you are looking for a book on how to secure Linux or NT, this is not your book. I think this book is written for people with a passion about security and who are serious about a career in information security. Those types of people will love this book.

4-0 out of 5 stars The law enforcement side of the cybercrime equation
Prior to 'High-Tech Crimes Revealed' (HTCR) I read and reviewed 'Stealing the Network: How to Own a Continent' (HTOAC).While HTOAC is fictional and written almost exclusively from the point of view of the 'hacker,' HTCR is mostly true and written from the law enforcement perspective.On the strength of the cases described in the first half of the book, I recommend HTCR as an introduction to the mindset needed to pursue and prosecute cyber criminals.

Author Steve Branigan brings a unique perspective to his book.In 1986-7 Branigan was a patrolman in the Seaside Heights Police Department, but three years later he investigated telecom incidents for Bell Communications Research.Later work at Lucent and Bell Labs prepared him for co-founding Lumeta in 2000.His experience with telecom security differentiates the book from those who spend more time on Internet-centric crimes.

I found the first half of the book more helpful than the second half, particularly when legal and criminal concepts are introduced in the context of security investigations.Ch 1 offers insight into drafting search warrants when pursuing a rogue insider.Ch 2 explains subpoenas and executing search warrants.Ch 3 discusses options at trial, like plea bargains.Ch 4 outlines an undercover sting and the role of confidential informants.Ch 5 talks about identity theft and ch 6 describes the author's role in interviewing two 'hackers.'

The first half of the book uses true stories to make its points, but the second shifts more to opinions with short stories added for interest.I skimmed these later chapters as they seemed more appropriate for those without security and forensic experience.

A few excerpts from the book are quote worthy.On p 106 Branigan notes that during a sting operation, the cops disabled exploit tools hosted on a cop-supervised bulletin board to avoid 'facilitating the transmission of hacking tools.'Consider that when you find a 'broken exploit.'A footnote on p 111 says 'NetStumbler is freeware.Why people write these things nobody knows.'NetStumbler isn't just for wardriving by those with malicious intent; sys admins also use it to discover rogue access points.

I agree with Thomas Duff's assessment regarding the shelf life of Branigan's stories.Many cases, like ch 1's SS7 intrusion, were cool despite being almost 10 years old.In other places Branigan really dated himself.For example, p 118 states 'the main set of backdoor programs for UNIX are collectively known as rootkit, and those for Windows-based systems are Back Orifice and Netbus.'That was mostly correct in 2000, but very dated by 2004.I also question the 'session takeover' techniques mentioned on p 175; far too little detail is offered to make me accept this 'magic' capability.

Overall I recommend reading HTCR.Branigan literally has a front-row seat on several fascinating security incidents.Few people have accompanied police when seizing evidence or performed hands-on analysis of live systems as related by HTCR.Readers with an interest in telco security will particularly enjoy Branigan's tales, and I appreciated his use of FreeBSD as a forensic platform. ... Read more


55. Cyber-crime: The Challenge in Asia
Hardcover: 434 Pages (2005-03-31)
list price: US$105.00 -- used & new: US$69.48
(price subject to change: see help)
Asin: 9622097359
Canada | United Kingdom | Germany | France | Japan

56. Trust and Crime in Information Societies
by Robin Mansell, Brian S. Collins
Paperback: 480 Pages (2007-04-23)
list price: US$45.00 -- used & new: US$38.89
(price subject to change: see help)
Asin: 1847203396
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This fascinating book gathers together an enviable range of experts from a variety of disciplines to study how trust and crime interact with new digital technologies. It provides a critical discussion on the prospects of the Internet and on the future of crime and crime prevention. It also presents a realistic vision of the implications and uncertainties of future developments in cyberspace, and identifies the key issues affecting the way in which today's complex information societies are evolving. The distinguished authors begin by exploring the social, economic and technological issues surrounding cyberspace. They identify the measures that need to be implemented to avoid the potential for the Internet to encourage new types of crime and to facilitate traditional crime. They then analyse topics such as the possible drivers of the evolution of cyberspace, the prospects created by innovations in technology, the threats and barriers to cyberspace development, and the feasibility and effectiveness of proposed crime prevention measures. They also address the important issues of risk, privacy and trust in cyberspace, and discuss the ethical, legal and regulatory issues.This important new book will be of immense value to academics and researchers with an interest in the social and technological aspects of information and communication technologies, law, criminology, public policy, Internet security and risk management. It will also appeal to a broad audience that is concerned about the potential threats posed by the advance of the information superhighway. ... Read more


57. Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
by Thomas J. Holt
 Hardcover: 350 Pages (2010-08-31)
list price: US$180.00 -- used & new: US$175.95
(price subject to change: see help)
Asin: 1616928050
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the cyber criminal curve. Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions.Including findings from experts in Criminal Justice, Business, and Information Technology Security from around the world, this book presents current research undertakings and findings in order to find interdisciplinary solutions to the complex domain of cyber crime and network breaches. ... Read more


58. Cyber Crime (True Crime)
by John Townsend
Paperback: 48 Pages (2005-09-15)
list price: US$8.99 -- used & new: US$8.99
(price subject to change: see help)
Asin: 1410911705
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Find out inside: What can a worm do to your computer?Which cyber criminal stole 20,000 credit card numbers?How can a firewall protect you against an email bomb?Why do people commit crimes?How do they do it and what are the consequences?Read this book and find out how cyber criminals operate.Discover how cyber vandals can cause thousands of dollars worth of damage without leaving their desks.What could happen if a cyber terrorist shut down the world's computers? ... Read more


59. Ultimate Internet Terrorist: How Hackers, Geeks, And Phreaks Can Ruin Your Trip On The Information Superhighway . . . And What You Can Do To Protect Yourself
by Robert Merkle
 Paperback: 152 Pages (1998-03)
list price: US$18.00 -- used & new: US$9.95
(price subject to change: see help)
Asin: 0873649702
Average Customer Review: 2.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This is an owner's manual to the "Darkside" of the Web. Read it and weep. Then do what it takes to save yourself from becoming roadkill on the Highway to Hell. ... Read more

Customer Reviews (7)

3-0 out of 5 stars Good but not grate
This book does a good job of telling the reader about problems they can have with their pcs, and how easy it is for people to take control of their pcs. However if you are a navice to the world of computers this book will make you wish you never buight a computer, on the other hand if you work in the IT feild this book to be basic.

2-0 out of 5 stars Full of scare tactics and misinformation
I had the misfortune of buying and reading this book for a course on Computer Security. If you're looking for the glance into the mind of a typical "3l33t h@x0r" you might find this interesting. If you're already familiar with the information security field you'll recognize that most of this book is at best very out of date, and at worst completely untrue.If you're not familiar with computers and the internet, please take this book with a HUGE grain of salt. It's meant to scare you, and if you let it, it will.

For $4 in the fiction section this might be a quick, fun read. For more than $10 it's really not worth it.

1-0 out of 5 stars This book ain't for you.....really
The book is a total waste of money, time and it will make you (that was mycase) wish you didn't buy it. It just tell you things a really experienceweb sufer (not hackers) already know. He says some stuff that could becalled hackers materials but it ain't that much as the title of the booksmakes you think. Anyway Robert Merkle, put another book that is calledInternet Outlaw i guess that seems to be pretty good for those interestedon hacking lessons...but the information that is on it will change soon soyou better buy it now while it still been valuable.

5-0 out of 5 stars Fascinatingly Vanguard!
I received this book as a gift and was shocked at how much info hackers can find out about users of the Web. This book is jammed with hard-to-find information and delivers the goods.

I would definitely recommend this book!

1-0 out of 5 stars Don't waste your money
If you are a novice and know little about the darkside of computers, this book might help you. On the other hand, if you look up hacking on the web, you will gain as much or probably more information than this book will giveyou.I didn't get anything out of this book that I've already knew.Allthat Robert Merkle does in the book was make fun of those who knew nothingon the subject, making fun of ignorance.He just brags on how smart hewas.However, if he was truly smart, he would cut out the garbage and givethe reader more information.Most of the information given in the book isbased on common sense and very very beginning hacker information.Don'twaste your time.I think I'm going to return this book.Don't waste yourmoney people. ... Read more


60. Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet
by Joseph Menn
Paperback: 304 Pages (2010-10-26)
list price: US$15.95 -- used & new: US$9.00
(price subject to change: see help)
Asin: 1586489070
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This gripping espionage tale penetrates the network of international mobsters and hackers who use the Internet to extort money from businesses, steal from tens of millions of consumers and attack government networks. In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, travelling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organised gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defence secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government. "Fatal System Error" penetrates both the Russian cyber-mob and Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought - and why the Internet might not survive. ... Read more

Customer Reviews (37)

5-0 out of 5 stars Great read, scary implications
This is one of those reads where you learn more with every paragraph.Chilling yet informative, you cannot avoid the conclusion that the Russians and Chinese are intent on owning the rest of the world, and may get there without firing one shot.If you have even the slightest interest at all in cyber-security, read this book.If you use a credit or debit card, read it and worry.

5-0 out of 5 stars Fatal System Error
Excellent book on cybercrime and the internet, written by an expert in the field of cyber security.

4-0 out of 5 stars A real public service
The book paints a very scary world of US criminals operating not very honest online gaming businesses from Costa Rica, and Russian criminals engaged in child porn, extortion and identity theft.They happen to collide with each other when the Russians try to extort the gaming businesses by denial of service attacks, and the US online gaming / criminal figures hire a former hacker / internet security maven to protect them.The episode opens his eyes to the use of the Internet for crime and he seeks to engage law enforcement to stop the criminals but the US agencies are - big surprise - barely interested.A lone figure in the UK grasps the significance and the two of them fly to Russia to engage the law enforcement authorities there (as if) to stop the Russian criminals. They experience little success and considerable personal risk in doing so.Along the way, one learns much of what is known about the degree of penetration of computer viruses, trojans, bots and so on. One is left in a state of extreme distrust of one's computer and very grateful to the author for publicizing this very serious problem.

4-0 out of 5 stars Nice intro to security
And how it is in real life. for many not to much new but still an exiting book to read.

4-0 out of 5 stars Recommend for IT pros
* I recommend this book for any IT professional who wants to understand why firewalls/load balancers/encryption technology are needed to defend off attacks.The book makes information security exciting by explaining how cybercriminals are tracked down, caught, and eventually tried in court.
* The book mentions cybercrime syndicates such as shadowcrew, carderplanet, and the Russian Business Network (RBN). All the aforementioned cybercrime syndicates are accessible only through direct contact with someone deep within the criminal organization since the underground forums have collapsed.
* The two main characters in the book are Andy Crocker and Barret Lyon. Andy Crocker "did the most that an individual in government could do to punish some of the worst of the cyber mafia." (Menn, 226).He set new standards of cooperation between the west and Russia for investigations and prosecutions.This was needed especially by hackers like "King Arthur" who were protected by local politicians and police.King Arthur and various other leaders in cybercrime evaded being caught by bribing government officials.
* Barret Lyon gained his experience by protecting an online gambling company, which opened up the doors to various other online gaming companies such as "[...]."He became familiar with the criminal underworld that owned these offshore companies.Eventually, he decided to work with the FBI to bring down these criminals.
... Read more


  Back | 41-60 of 100 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

site stats