Digital Crime and Digital TerrorismFor courses in terrorism and computer crime. This text focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders. Using real life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes. |
From inside the book
Results 1-3 of 39
Page 9
... Target Crimes where the computer itself is the target include the denial of expected service or the alteration of data . In other words , the attack seeks to deny the legitimate user or owner of the system access to their data or ...
... Target Crimes where the computer itself is the target include the denial of expected service or the alteration of data . In other words , the attack seeks to deny the legitimate user or owner of the system access to their data or ...
Page 181
... target victims whom they perceive to have exceptional qualities and high social standing . These stalkers seek to raise their own self - esteem by associating with those whom they hold in high regard . These types of stalkers are also ...
... target victims whom they perceive to have exceptional qualities and high social standing . These stalkers seek to raise their own self - esteem by associating with those whom they hold in high regard . These types of stalkers are also ...
Page 284
... target of the warrant or if the data on the computer is the target of the warrant . If stolen property is the target of the search , the contraband ( i.e. , the fruit of the crime ) may require specific and particular description . When ...
... target of the warrant or if the data on the computer is the target of the warrant . If stolen property is the target of the search , the contraband ( i.e. , the fruit of the crime ) may require specific and particular description . When ...
Other editions - View all
Common terms and phrases
activity acts agencies analysis attacks Available on line bedroom hackers behavior chapter child pornography commit communication computer crime computer security computer systems corporate court created credit card criminal cyber cyberstalking cyberterrorism Dark Avenger described digital crime disk e-mail electronic embezzlement encryption espionage experts exploitation federal FF FF FF forensic fraud groups hacker ethic hacker subculture hacking hard drive hash hoaxes Ibid identified identity theft images individuals infected information warfare infrastructure Internet investigation involved Justice Kevin Mitnick larval hackers law enforcement malicious code Mitnick National offenses operating passwords pedophiles percent person police potential problem prosecution protection puter records reported SANS Institute schemes script kiddies server sex tourism sexual social specific stalking storage target telephone terrorism terrorist theory threats tion Trojan horse types U.S. Department victim virus writers viruses vulnerabilities warez worm