Description |
electronic texts (265 pages : illustrations) : digital files |
Contents |
1. Computer hacking and the techniques of neutralization / Robert Morris -- 2. Between hackers and white-collar offenders / Orly Turgeman-Goldschmidt -- 3. The general theory of crime and computer hacking / Adam Bossler, George Burruss -- 4. Micro-frauds / David. Wall -- 5. Policing of movie and music piracy / Johnny Nhan, Alesandra Garbagnati -- 6. Deciphering the hacker underground / Michael Bachmann -- 7. Examining the language of carders / Thomas Holt -- 8. Female and male hacker conferences attendees / Bernadette Schell, June Melnychuk -- 9. Cyber conflict as an emergent social phenomenon / Dorothy Denning -- 10. Control systems security / Jake Brodsky, Robert Radvanovsky -- 11. Social dynamics and the future of technology-driven crime / Max Kilger -- 12. The 2009 Rotman-Telus Joint Study on IT security best practices / Walid Hejazi, Alan Lefort, Rafael Etges, Ben Sapiro |
Summary |
"This book addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher |
Analysis |
General theory of crime and computer hacking |
|
Hacking neutralization techniques |
|
Micro-frauds |
|
Nodal governance security frameworks |
|
Language of carders |
|
SCADA systems and hacking |
|
Hackers and white-collar offenders |
|
Cyber conflict as a social phenomenon |
|
Future of technology-driven crime |
|
Canadian and American IT security practices |
|
Hacker underground |
Bibliography |
Includes bibliographical references |
Notes |
Also available in print |
|
Mode of access: Internet |
|
Title screen (IGI Global, viewed Nov. 15, 2010) |
Subject |
Computer crimes.
|
|
Hackers.
|
|
Computer crimes.
|
|
Hackers.
|
Form |
Electronic book
|
Author |
Holt, Thomas J., 1978-
|
|
Schell, Bernadette H. (Bernadette Hlubik), 1952-
|
|
IGI Global.
|
LC no. |
2010016447 |
ISBN |
9781616928070 |
|
1616928077 |
|