詳細書目資料

資料來源: Google Book
157
0
0
0

Cybercrime [electronic resource] : criminal threats from cyberspace / Susan W. Brenner

  • 作者: Brenner, Susan W. , 1947-
  • 出版: Santa Barbara, Calif. : Praeger c2010
  • 叢書名: Crime, media, and popular culture
  • 主題: Computer crimes , Computer networks--Law and legislation
  • ISBN: 0313365474 (e-book) 、 9780313365478 (e-book) 、 0313365466 (alk. paper) 、 9780313365461 (alk. paper)
  • URL: An electronic book in the ABC-CLIO eBooks Online database, accessible through the World Wide Web; click for information
  • 一般註:Includes bibliographical references and index 21st century twilight zone : stalking a town--From mainframes to metaverse : the origins and evolution of cybercrime--Three categories--Target cybercrimes : hacking, malware, etc--Tool cybercrimes : fraud, harassment-- murder?--Cyber-CSI : computer crime scene--Beyond war games : who are the cybercriminals?--Cyber-law and order : investigating and prosecuting cybercrime--U.S. law enforcement : agencies and challenges--Global law enforcement : feweragencies, even more challenges--Privacy versus security : which trumps?--What is the future of cybercrime?
  • 讀者標籤:
  • 引用連結:
  • 系統號: 005166097 | 機讀編目格式

館藏資訊

This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to society. Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it. Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement's ability to pursue cybercriminals and protecting the privacy of U.S. citizens.

資料來源: Google Book
延伸查詢 Google Books Amazon
回到最上