Search:

Cyber crime / by Gerdes, Louise I.,1953-(CARDINAL)273449;
Includes bibliographical references and index.Presents a series of essays with varying viewpoints on the subject of computer crime. Includes a list of organizations to contact.
Subjects: Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

Patrolling cyberspace : lessons learned from a lifetime in data security / by Schmidt, Howard A.(CARDINAL)552193;
Subjects: Computer crimes.; Computer security.;
Available copies: 0 / Total copies: 1
unAPI

Information warfare : chaos on the electronic superhighway / by Schwartau, Winn.(CARDINAL)208326;
Includes bibliographical references and index.The Econo-politics of information warfare -- Computers everywhere and the global network -- Binary schizophrenia -- On the nature of insidious -- Influenza, malicious software, and OOPS! -- Sniffers and the switch -- The World of Mr. va Eck -- Cryptography ...As the National Information Infrastructure grows and evolves into everyman's electronic superhighway, are we opening the doors to an electronic cold war? Or are we on the edge of a brave new precipice overlooking the dawn of the information revolution? With over 125,000,000 computers inextricably tying our economy together through complex land and satellite-based communications systems, a major portion of our domestic 6 trillion dollar economy depends on their consistent and reliable operation. In a serious and inviting manner, Information Warfare: Chaos on the Electronic Superhighway examines the awesome potential for industrial and international espionage. Through sabotage, theft, data manipulation, and other means, our economy could be crippled beyond anything in recent history. Currently within the banking community it is common practice for banks to use creative accounting to hide millions of dollars lost every year through Information Warfare. In Information Warfare the "digital persona" plays the role of victim and perpetrator. The wrong hands could extract the most personal information about the "digital you," not the least of which could be medical, financial, business, legal, and criminal documentation. An individual could alter his/her own records to eradicate nefarious histories. Or an individual could alter anyone's electronic documentation for any reason. Information Warfare outlines almost every kind of informational disaster imaginable leaving the reader to think there may be no way out of the quagmire that is the new information age. However, author Winn Schwartau details current trends in Information Warfare and inspires the dialogue necessary to establish a National Information Policy, a constitution for Cyberspace and an Electronic Bill of Rights.
Subjects: Computer security.; Computer crimes.;
Available copies: 2 / Total copies: 2
On-line resources: Suggest title for digitization;
unAPI

Does the internet increase crime? / by Kiesbye, Stefan.(CARDINAL)467165;
Includes bibliographical references (pages 99-104) and index.Explores Internet-related sexual offenses, as well as cyberbullying, online gambling, and other manifestations of illegal activity conducted on the Internet.
Subjects: Computer crimes.; Internet.;
Available copies: 1 / Total copies: 1
unAPI

Cyberterrorism / by Grove, Erica,editor.(CARDINAL)863304;
Includes bibliographical references and index."Anthology of curated articles exploring cyberterrorism and cyber attacks used to create chaos and fear. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it"--Grades 10-12Ages 15+
Subjects: Cyberterrorism.; Computer crimes.;
Available copies: 2 / Total copies: 2
unAPI

The dark side of the Internet : protecting yourself and your family from online criminals / by Bocij, Paul.(CARDINAL)395414;
Includes bibliographical references and index.Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information.
Subjects: Computer crimes.; Cyberterrorism.;
Available copies: 3 / Total copies: 3
unAPI

Kingdom of lies : unnerving adventures in the world of cybercrime / by Fazzini, Kate,author.(CARDINAL)805219;
Before: The swallows -- Preface: Kingdom of lies -- The futurethreat -- The charlatan -- The wall -- The baby -- The Italians -- The gig economy --The tryout -- The father -- The teenager -- The medium -- The lovers -- The researcher -- The volunteers -- The mother -- The ghost -- The recruiters -- The insider threat -- The terrorist -- The long trip -- The reason -- The Spaniard -- The project manager -- The reporter --Epilogue: We didn't start the fire -- Appendix A: A glossary of cyberterms -- Appendix B: Epilogue explained.Includes bibliographical references (pages 223-225) and index.A 19-year-old Romanian student stumbles into a criminal ransomware ring in her village. Soon she is extorting Silicon Valley billionaires for millions---without knowing the first thing about computers. A veteran cybersecurity specialist has built a deep network of top notch hackers in one of the world's largest banks. But then the bank brings in a cadre of ex-military personnel to "help." A cynical Russian only leaves his tiny New Jersey apartment to hack sports cars at a high performance shop in Newark. But he opens his door to a consultant who needs his help. A hotel doorman in China once served in the People's Army, stealing intellectual property from American companies. Now he uses his skills to build up a private side-business selling the data he takes from travelers to Shanghai's commercial center. Kingdom of Lies follows the intertwined stories of cybercriminals and ethical hackers as they jump from criminal trend to criminal trend, crisis to crisis. A cybersecurity professional turned journalist, Kate Fazzini illuminates the many lies companies and governments tell us about our security, the lies criminals tell to get ahead, and the lies security leaders tell to make us think they are better at their jobs than they are. Like traffic set in the cybercrime world,
Subjects: Computer crimes.; Hackers.;
Available copies: 4 / Total copies: 6
unAPI

You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches / by Wolff, Josephine,author.(CARDINAL)803997;
Includes bibliographical references and index.Introduction -- Lessons from financially motivated cybercrimes -- Operation get rich or die trying : how the TJX breach set the stage for a decade of payment card conflict -- "What they aren't telling you is their rules are archaic" : the South Carolina Department of Revenue breach, IRS fraud & identity theft -- The most wanted cybercriminal in the world : gameover zeus, cryptolocker, and the rise of ransomware -- Lessons from cyber espionage -- Certificates gone rogue : the diginotar compromise and the fragile trust infrastructure of the online world -- No doubt to hack you, writed by uglygorilla : China's PLA unit 61398 and economic espionage -- "Decades in the making" : the office of personnel management breach and political espionage -- Lessons from online acts of vengeance -- Operation Stophaus : the Spamhaus denial-of-service attacks -- "An epic nightmare" : the Sony breach and ex-post mitigation -- Imperfect affair : Ashley Madison and the economics of embarrassment -- Who should safeguard our data? : shared responsibility and liability -- "Email the way it should be" : the role of application designers and software developers -- Reasonable security : the role of organizations in protecting their data and networks -- "Happy talk about good ideas" :the role of policy makers in defending computer systems -- Conclusion: it will take all of us -- Notes -- Bibliography -- Index.What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach-the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump-makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks-financial gain, espionage, and public humiliation of the victims-that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
Subjects: Computer crimes;
Available copies: 1 / Total copies: 1
unAPI

Digital crime : policing the Cybernation / by Barrett, Neil.;
Subjects: Computer crimes.; Computer crimes; Computer security.;
Available copies: 1 / Total copies: 1
unAPI

Cyberphobia : identity, trust, security and the Internet / by Lucas, Edward,1962-author.(CARDINAL)556495;
Includes bibliographical references (pages 277-298) and index.Meet the Hakhetts -- The unreliability of computers -- Identity and its enemies -- Collateral damage -- The geopolitics of the Internet -- Spies v warriors -- The spy in your pocket -- The danger of monoculture -- Clearing the jungle -- Passwords unscrambled -- Identity politics -- Turning the tables."Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and Internet systems near us put everyone at risk"--Dust jacket flap.
Subjects: Computer crimes.; Computer security.; Internet.;
Available copies: 7 / Total copies: 7
unAPI