- Shopping Bag ( 0 items )
Chapter One provides information on the underlying infrastructure and communication protocols to help in understanding computer crimes and the dangers associated with them. Chapter Two categorizes cyber attacks by various motives?personal, pleasure-seeking, attention-seeking, ...
Ships from: Chatham, NJ
Usually ships in 1-2 business days
Chapter One provides information on the underlying infrastructure and communication protocols to help in understanding computer crimes and the dangers associated with them. Chapter Two categorizes cyber attacks by various motives—personal, pleasure-seeking, attention-seeking, revenge or even vendetta, financial escapades and raw hate. Likely targets and security issues in the day-to-day computer augmented settings are discussed in Chapter Three. Chapter Four addresses the costs of computer crimes to individuals, to the nation and to businesses and their clients. Crime prevention is the topic of Chapter Five, which describes the efforts being made by individuals, civic groups, institutions, nations and multinational bodies to eliminate computer crime. Chapter Six assesses the future of cyber attacks by looking at the changing technology, the availability of computer access to the wrong people, and education and crime prevention measures. The mind of the computer hacker is explored at length.
Author Biography: Joseph Migga Kizza is also the author of Civilizing the Internet: Global Concerns and Efforts Toward Regulation (1998, $32, "recommended"—Library Journal) and a professor of computer science at the University of Tennessee at Chattanooga. He resides in Hixson, Tennessee.
|2||Anatomy of the Problem||37|
|3||Types of Cyber Attacks||60|
|4||Cyber Crimes: Costs and Social Consequences||90|
|5||Cyber Crimes: Prevention, Detection, and System Survivability||105|
|6||Cyberspace and Cyber Ethics Today and Beyond||141|
|App.: Exercise Questions for Classroom Use||170|