This book focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders. Using real life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes. For professionals in the technical field as well as forensic investigators and other criminal justice professionals.
"synopsis" may belong to another edition of this title.
Book Description Prentice Hall, 2005. Paperback. Book Condition: New. book. Bookseller Inventory # 0131141376
Book Description Prentice Hall, 2005. Paperback. Book Condition: New. 1. Bookseller Inventory # DADAX0131141376
Book Description Prentice Hall, 2005. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: (NOTE:Each chapter concludes with Summary and Review Questions.)SECTION I: THE ETIOLOGY OF DIGITAL CRIME AND DIGITAL TERRORISM. 1. Introduction and Overview of Digital Crime. Chapter Objectives. Introduction. New Threats to the Information Age. Purpose and Scope of this Book. Digital Crime and Digital Terrorism. A Developmental Perspective of the Growing Problem. Increases in Cyber Victimization. The Changing Character of Cyber Victimization Types of Computer Crime. The Computer as Target. The Computer as an Instrument of a Crime. The Computer as Incidental to a Crime. Crimes Associated with the Prevalence of Computers. 2. Digital Terrorism. Chapter Objectives. Defining the Concepts. Buzzwords: Information Warfare and Cyber-Terrorism. Risk and Critical Infrastructure Attacks. Information Attacks. Web-Site Defacement. Cyberplagues-Viruses and Worms. Distributed Denial of Service Attacks. Unauthorized Intrusions. Cyber and Technological Facilitation. Facilitation of Attack. Data Hiding. Cryptography. Propaganda and Promotion. Cyber-Terrorism as an Adjunct Attack. Al-Qaeda and Information Technology. China and Information Warfare. 3. The Criminology of Computer Crime. Introduction. Choice Theory. Routine Activities. Deterrence Theory. Psychological Theories. Moral Development and Crime. Personality Disorders. Pedophiles and Psychological Theory. Social Structure Theories. Strain Theory. White-Collar Crime and Strain Theory. Subculture Theory. Hackers and Social Structure Theories. Social Process Theories. Learning Theory. Social Control Theory. Virus Writers and Social Process Theories. Terrorism and Political Theory. 4. Digital Criminals and Hackers. <BR. Bookseller Inventory # ABE_book_new_0131141376
Book Description Prentice Hall, 2005. Paperback. Book Condition: New. Bookseller Inventory # P110131141376
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801311413771.0