Fighting Computer Crime

Front Cover
Scribner, 1983 - Computer crimes - 352 pages
1 Review
Reviews aren't verified, but Google checks for and removes fake content when it's identified
Discusses how different types of computer crimes are executed and considers ethical conflicts, corrections to inadequate laws, and future possibilities of computer crime escalation

From inside the book

What people are saying - Write a review

Reviews aren't verified, but Google checks for and removes fake content when it's identified

LibraryThing Review

User Review  - jaygheiser - LibraryThing

Obsoleting the common three elements of security, confidentiality, integrity, and availability, the fundamentals of his new framework of information security are availability, utility, integrity ... Read full review

Contents

PART ONE Computer Abuse 1 An Almost Perfect Crime
3
Computer Abuse Research
14
How Much Computer Crime Is There? 3 12
23
Copyright

52 other sections not shown

Other editions - View all

Common terms and phrases

Bibliographic information