Digital Crime and Digital TerrorismFor courses in terrorism and computer crime. This text focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders. Using real life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes. |
Other editions - View all
Common terms and phrases
activity acts agencies analysis attacks Available on line bedroom hackers behavior chapter child pornography commit communication computer crime computer security computer systems corporate court created credit card criminal cyber cyberstalking cyberterrorism Dark Avenger described digital crime disk e-mail electronic embezzlement encryption espionage experts exploitation federal FF FF FF forensic fraud groups hacker ethic hacker subculture hacking hard drive hash hoaxes Ibid identified identity theft images individuals infected information warfare infrastructure Internet investigation involved Justice Kevin Mitnick larval hackers law enforcement malicious code Mitnick National offenses operating passwords pedophiles percent person police potential problem prosecution protection puter records reported SANS Institute schemes script kiddies server sex tourism sexual social specific stalking storage target telephone terrorism terrorist theory threats tion Trojan horse types U.S. Department victim virus writers viruses vulnerabilities warez worm