e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Basic C - Computer & Internet Crime (Books)

  Back | 61-80 of 100 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

click price to see details     click image to enlarge     click link to go to the store

$176.00
61. Artificial Crime Analysis Systems:
$18.92
62. Cybercrime: Digital Cops in a
$4.66
63. Internet Safety (Reference Shelf)
$14.50
64. The Personal Internet Security
$5.00
65. Internet Besieged: Countering
$51.03
66. Superhighway Robbery: Preventing
$3.94
67. System Crash (Internet Detectives)
$12.58
68. Ultimate Internet Outlaw: How
 
$340.00
69. Cyberspace Crime (International
$42.49
70. Music Piracy and Crime Theory
71. Crime and the Internet
$8.77
72. Net Crimes & Misdemeanors:
$26.95
73. Understanding Online Piracy: The
$4.99
74. Cyberwars: Espionage on the Internet
75. Creeping Failure: How We Broke
$12.99
76. Viruses and Spam (Cyber Citizenship
$256.00
77. Crime and Deviance in Cyberspace
$65.00
78. Policing Cyberspace: A Structural
$70.00
79. Computer Forensics: Principles
$15.10
80. Web of Deception: Misinformation

61. Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
by Lin Liu
Hardcover: 508 Pages (2008-01-29)
list price: US$180.00 -- used & new: US$176.00
(price subject to change: see help)
Asin: 1599045915
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably.

Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems discusses leading research on the use of computer simulation of crime patterns to reveal hidden processes of urban crimes, taking an interdisciplinary approach by combining criminology, computer simulation, and geographic information systems into one comprehensive resource. ... Read more


62. Cybercrime: Digital Cops in a Networked Environment (Ex Machina: Law, Technology, and Society)
by J. M. Balkin
Paperback: 272 Pages (2007-03-01)
list price: US$23.00 -- used & new: US$18.92
(price subject to change: see help)
Asin: 0814799833
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

The Internet has dramatically altered the landscape of crime and national security, creating new threats, such as identity theft, computer viruses, and cyberattacks. Moreover, because cybercrimes are often not limited to a single site or nation, crime scenes themselves have changed. Consequently, law enforcement must confront these new dangers and embrace novel methods of prevention, as well as produce new tools for digital surveillance—which can jeopardize privacy and civil liberties.

Cybercrime brings together leading experts in law, criminal justice, and security studies to describe crime prevention and security protection in the electronic age. Ranging from new government requirements that facilitate spying to new methods of digital proof, the book is essential to understand how criminal law—and even crime itself—have been transformed in our networked world.

Contributors: Jack M. Balkin, Susan W. Brenner, Daniel E. Geer, Jr., James Grimmelmann, Emily Hancock, Beryl A. Howell, Curtis E.A. Karnow, Eddan Katz, Orin S. Kerr, Nimrod Kozlovski, Helen Nissenbaum, Kim A. Taipale, Lee Tien, Shlomit Wagman, and Tal Zarsky.

... Read more

Customer Reviews (1)

5-0 out of 5 stars Informative!
This book is a must read for all cyber investigators, all computer forensics, all computer users, all IT personnel, and of course, for all WRITERS like me!Cold Eyes ... Read more


63. Internet Safety (Reference Shelf)
Paperback: 176 Pages (2009-04)
list price: US$50.00 -- used & new: US$4.66
(price subject to change: see help)
Asin: 0824210891
Canada | United Kingdom | Germany | France | Japan

64. The Personal Internet Security Guidebook: Keeping Hackers and Crackers out of Your Home (The Korper and Ellis E-Commerce Books Series)
by Tim Speed, Juanita Ellis, Steffano Korper
Paperback: 202 Pages (2001-10-19)
list price: US$73.95 -- used & new: US$14.50
(price subject to change: see help)
Asin: 0126565619
Average Customer Review: 3.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.

This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.

A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems ... Read more

Customer Reviews (5)

1-0 out of 5 stars The personal Internet security guidebook
This book is poorly written and contains very little useful information.It spends far too much time describing trivial differences between various computer & network configurations, and too little time really discussing security.When it comes to discussing security tools (in an appendix), it simply lists all of the available products, with little to no comparisons or recommendations.The average user will get nothing from this book, and is better off spending the money on a firewall or screensaver.

5-0 out of 5 stars Home router protection
I was able to use the advise from this book to setup my home router. I have been watching the logs and it is amazing how many times on any one day that I get attacked. I have a cable modem at my apt. This book was great on the details about how to setup the home router.

5-0 out of 5 stars Hackers at the door
This book was very useful ---- I found that I get attacked every day --- due to logs on my router. I agree with one of the other reviews -- too much Linksys stuff ... but still a great book and provided me with the information I needed to block these constant attacks on my cable modem line.

1-0 out of 5 stars An appalling mess!
This book contains some useful information, simply presented, but it is so poorly written and edited that I kept thinking that it was meant to be a parody, doing for computer books what "Spinal Tap" did for rock documentaries.

The text appears not to have been edited, or even proof-read:In a chapter describing the history of the Internet, Vinton Cerf is sometimes "Cert" and sometimes "Cerf," even on the same page!In one case, the author states "So Cerf (yes dudes, not SERF!) and Kahn developed a new protocol..." and a few paragraphs later, "You see, the original model that Cert and Kahn put together...."(P.11).These quotes also give a good taste of the author's writing style, which might be described as "faux au courant."

Beyond that, the material is very disorganized.Every page seems to be peppered with seemingly random footnotes, often providing trivial information, while many obscure acronyms are never even explained at all.

The book is 200 pages long, much of it taken up with screenshots and diagrams. 40 of those pages are devoted to a list of security-related hardware and software tools with descriptions obviously copied from the vendor's advertising materials, and much of it already out-of-date.The foreword is by the CEO of Linksys. whose products are featured in many screenshots, and who is further flattered with a 2/3 page bio (more than is devoted to all three authors combined on the back cover), leading me to believe that the book is a Linksys commission with some additional support from the other sources mentioned.

The book is a quick read, and it might appeal to the dumb and dumber crowd, but I wouldn't trust it or recommend it for anyone else.

5-0 out of 5 stars Good Simple Easy to understand
I was very impressed with the way the author was able to simplify the discussions around securing your computers, whether it be at home or a laptop on the road. The list of reference websites was amazing and proves that the author took the time to research the book carefully. He did not just give simple instructions for securing the computer. He actually took the time to explain what everything was and why it was important to make the changes. Good book for novices at home and can help fill in the gaps for more knowledgeable people. An excellent resource and reference. I recommend it. ... Read more


65. Internet Besieged: Countering Cyberspace Scofflaws
by Dorothy E. Denning, Peter J. Denning
Paperback: 560 Pages (1997-10-13)
list price: US$39.95 -- used & new: US$5.00
(price subject to change: see help)
Asin: 0201308207
Average Customer Review: 3.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Break-ins on the Internet! Assaults on privacy! Theft of information! They are prohibited, yet they happen. How is this so?Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingenious strategies employed by intruders. It shows how security experts must be both defensive and proactive to protect information, privacy, and electronic commerce. Internet Besieged consists of over thirty original and recently published chapters written by leading figures in security. They range from technical explanations of encryption and intrusion-detection systems to popular accounts of hacker attacks. Internet Besieged is organized for the general reader as well asthe practicing professional. It covers: the emergence of the Internet-the evolution of security problems and required countermeasures; major patterns of weakness in Internet-connected computer systems and methods for preventing and detecting attacks; the use of cryptography to secure computers and data on the Internet; electronic commerce and secure transactions-authentication and integrity-checking technologies; foiling identity theft; and ethics, laws, practices, and policies that govern human interaction on the Internet. For software developers, system managers and engineers, students, and concerned citizens, this book provides a broad awareness of Internet security risk while exploring the social, legal, political, and ethical implications of security breaches and suggested countermeasures. Contributors include: Steve Bellovin, Matt Bishop, Bill Cheswick, Jim Christy, Stephen T. Kent, Steven Levy, Teresa Lunt, Peter G. Neumann, E. Eugene Schultz, Eugene H. Spafford, and Bruce Sterling.Amazon.com Review
This detailed collection of essays takes a practical look atthe area of online security. While the editors of and contributors toInternet Besieged pull no punches in their cautions, theirpurpose is not to alarm but to inform. Given that electronic banditryand vandalism exist, what are wise system designers and operators todo about it? The contributors look at existing computercrimes--including password interception, electronic forgery, and viruspassing--and examine the techniques now available to thwartperpetrators. The first of the book's five sections covers thebackground of the Internet from a security perspective. The secondzooms in on the weaknesses of Internet-connected computer systems andshows how cybercriminals exploit them. Part 3 details thecryptographic methods available to help secure systems, while thefourth section explores the particular challenges of electroniccommerce. The final section looks at the larger and nontechnicalissues of Internet practices, laws, and policies. ... Read more

Customer Reviews (2)

3-0 out of 5 stars There is better
This book was okay at best.I found 'Life and Death on the Internet' by Keith Schroeder to be a far better, interesting and informative book.Personally, I would pass on this book and get Mr. Schroeder's.

4-0 out of 5 stars A well rounded primer to this important topic
Internet Besieged - Countering Cyberspace Scofflaws Dorothy E. Denning Peter J. Denning Addison- Wesley 1998

This is a collection of thirty essays covering a variety of aspects of information security written well known American commentators. The 1998 publication date on this book is slightly misleading since some of the essays contained within it date back to 1992. The majority of the papers date from 1996. But this should not seriously deter the reader since the many of the articles are likely to become the foundation texts of the industry and stand the test of time and distance.

The first of the book's five sections covers the background of the Internet from a security perspective. The second focuses on the weaknesses of Internet-connected computer systems and shows how criminals exploit them. Part 3, details the cryptographic methods available to help secure systems, while the fourth section explores the particular challenges of electronic commerce. The final section looks at the larger and non- technical issues of Internet practices, laws, and policies.

The first section is a well balanced picture of the Internet as it stands today . The best parts are theoverview chapters by Peter Denning "The Internet After Thirty Years" and Dorothy E. Denning "Cyberspace Attacks and Countermeasures" The second section on Internet Security is less interesting as too many of the papers are unnecessarily technical-better analysis can of the problem can be found in some computer science text books. The book is strongest, naturally given its main authors, in the cryptographic section - although I still prefer Bruce Schneier's "Applied Cryptography" for an overview of the subject. The electronic commerce section is completely out of date - a great deal has happened in the two years since it was written. But the final section has three interesting papers by Dorothy E. Denning "Encryption Policy and Market Trends" (which should be required reading for anyone wishing!to take issue with the DTI's proposals on encryption and key escrow anda couple of nice essays by Bruce Sterling on legal and ethical issues.

This is a good book to dip into to get ideas on computer security. The bibliographies are thorough and the tone, in the main, is light but authoritative.

Alistair KELMAN ... Read more


66. Superhighway Robbery: Preventing E-Commerce Crime (Crime Science)
by Graeme R. Newman, R. V. G. Clarke
Hardcover: 256 Pages (2003-08)
list price: US$69.95 -- used & new: US$51.03
(price subject to change: see help)
Asin: 1843920182
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This work, written by two leading authorities in the field, provides a systematic application of concepts of situational crime prevention to internet and e-commerce crime, exploring ways in which concepts of crime prevention developed in other contexts can be fruitfully applied in this new environment. Their argument is that situational crime prevention works, and is ideally suited to proving the means of developing measures to combat rapidly growing e-commerce crime. Chapters in the book seek to identify the specific opportunities and transactions in which crime can occur in the e-commerce environment, and the different kinds of information which are crime targets - identified as intellectual property, intelligence, information systems and services of various kinds (banking, purchasing etc). Consumer products are also examined with a view to identifying the elements that make them particularly vulnerable to theft.In response a variety of techniques to counter e-commerce crime are identified, underpinned by seeking to increase the effort the criminal must make to carry out crime, increase the perceived risk of crime, reduce the anticipated rewards of crime, and remove excuses for the criminal. ... Read more


67. System Crash (Internet Detectives)
by Michael Coleman
Paperback: 128 Pages (1998-03-09)
list price: US$3.99 -- used & new: US$3.94
(price subject to change: see help)
Asin: 0553486543
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
A blackmail threat has been posted on the Net. Is it a hoax? Or will famous theme-park rides really start to become death traps? As they head off on their theme-park vacation, Josh Allen, Tamsyn Smith and Rob Zanelli hope it's a hoax. But a frightening incident proves it's not. With the help if their friends on the Net, they must find the unknown blackmailer--before someone gets killed. ... Read more

Customer Reviews (2)

4-0 out of 5 stars Not bad at all!
This is one of my favourite Internet Detective Books, and I've read up to#8. The plot was extremely well put together. The only thing wrong with itwas, Mitch didn't go to a theme park! Poor old Mitch, he gets left out toomuch! Next time, Mr. Coleman, give Mitch some excitement. The only book hedoes anything good in is "Speed Surf". By the way, Josh is myfavourite character, not Mitch. I just want to see justice served!

5-0 out of 5 stars Really good book!
This book was great! This is how it starts: AN OPEN LETTER TO PLANET EXCITEMENT CORPORATION And so vacation time begins. During the next few weeks, many people will visit your attractions througout the world. THEY WILL BE IN GREAT DANGER.... Icarus

That's the blackmail threat. Is it a hoax? Or will famous theme-park rides really start to become death traps? As they head off on their theme-park vacation, Josh Allan, Tamsyn Smith, and Rob Zanelli hope it's a hoax. But a frightening incident proves it's not. With the help of their friends on the Net, the must find the unknown blackmailer-before someone gets killed....Oh, yeah. Tom and Josh meet each other. It's a long story as Josh said in the book. Also, is this the end of Internet Detectives? This series is really short then! There are only 5 books in it! I hope there will be more books. Because usually in the back, it tells what the next book will be about. But this time they didn't....They also put in the back cover: Surf all the titles in INTERNET DETECTIVES for more cybermysteries! But they usually put the next title.... ... Read more


68. Ultimate Internet Outlaw: How Surfers Steal Sex, Software, Cds, Games, And More Top-Secret Stuff On The Information Superhighway
by Robert Merkle
Paperback: 96 Pages (1999-05)
list price: US$15.00 -- used & new: US$12.58
(price subject to change: see help)
Asin: 1581600291
Average Customer Review: 2.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Find out how experienced surfers steal CD-quality music off the 'Net, break into adult "pay-only" Web sites; download software, arcade games and more for free; plus how to surf the Web without your IP (or anyone) knowing what you're up to. This is the hard-core stuff surfers have zealously guarded . . . until now! ... Read more

Customer Reviews (5)

1-0 out of 5 stars Don't waste your money on this book.
very little info in this book. I am not a hacker in any sense of the word and i allready know everything in this book. maybe his other books are better but, i don't think i'll waste more money on them.

1-0 out of 5 stars Not ... worth my time.
Uggh.Honestly.OK, so I'm a professional nerd, but I got curious.In the end, I... think this book is a good example of sensationalism and shock tactics. If you've spent more than a month or two on the internet, you've probably figured out everything in this book anyway. I must admit that several times I just started snickering.The processes he describes are what I would expect of a typical 'script kiddie', and really lack anything in the line of finesse, skill, or cleverness.

Seriously, don't spend your money on this book. If you are relatively new to the internet, get yourself one of those " for dummies" books; they're halfway decent. If you know a little and want to know more, pick up some light technical books. If you just want to steal data, please buy this book.*snicker*Please.Also, you might want to see the related book, "How to be a Bungling 'net Thief" for more good tips.

1-0 out of 5 stars Ultimate Internet Outlaw (not!)
If you're familiar with FTP's, email, finding MP3 files (which everyone and their brother can do without breaking a sweat), this book is NOT for you! The information in here is so basic it's embarrassing to think that I fell for reviews given by other readers. The information is VERY dated; he calls searching for mp3's "illegal". Oh, and he also talks about all the "secret and illegal" files you can find on FTP servers. Like, no one knows they're out there! If you're looking for a book on how to hack, or some really interesting, technical information that you can use while surfing the steamy side of the WWW, this ain't it!

4-0 out of 5 stars Good, but will get outdated fast since the net is changing.
How surfers steal Sex, Software, CDs, Games and more stuff from the internet. This book goes from very simple explainations about he net, on to more complex items like finding "Pirate Sites", findingpasswords, etc from web pages. It even covers how to lurk the net withoutanyone knowing where you travel... not even your service provider.

Theauthor assumes you know such things as how to use compression tools (.ZIPformat), what an internet service provider (ISP) is and how to openmultiple broaswers, he takes off from there with pretty detailedinformation on how to steal, hack and basically get web stuff free.

Thelanguage gets kinda raw at some points, it was written in a way to keep theadult reader interested, but it is NOT for the kiddies.

The DownSide:

The language is a bit harsh as mentioned above, and the materialwill soon be dated since the net and computers change so fast, but it is agood up-to-date resource right now.

5-0 out of 5 stars I bought this book off Amazon.com.It is a truly must read!
This is a truly knowledgeable no B.S. book!A must read for anyone who is interested in high-tech computer crime, without getting caught!!! ... Read more


69. Cyberspace Crime (International Library of Criminology, Criminal Justice & Penology.)
 Hardcover: 500 Pages (2003-06)
list price: US$340.00 -- used & new: US$340.00
(price subject to change: see help)
Asin: 0754621901
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process. ... Read more


70. Music Piracy and Crime Theory (Criminal Justice: Recent Scholarship)
by Sameer Hinduja
Hardcover: 218 Pages (2005-11-20)
list price: US$60.00 -- used & new: US$42.49
(price subject to change: see help)
Asin: 1593321244
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Hinduja examines the social, psychological, criminological, and behavioral aspects of Internet crime.Guided by the most prominent general theories of criminal behavior, he explores music piracy - an all too-common form of cybercrime - by attempting to answer a number of questions.Does stress and strain play a role?What about low self-control?Is music piracy learned within intimate social groups?Do rationalizations and justifications contribute to participation?Is the behavior strengthened or weakened through rewards and punishments?Hinduja then proposes a model which integrates both "social" and "technical" factors to inform and guide strategies to combat music piracy, and potentially other variants of high-tech crime. ... Read more


71. Crime and the Internet
by David S.Wall
Kindle Edition: 240 Pages (2007-03-20)
list price: US$51.95
Asin: B000OT85UY
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

We have seen the astounding potential of the Internet as an informational tool, but we are also beginning to encounter the infinite questions it unfurls about legal issues and crimes committed with its aid.David Wall and his stellar cast of contributors address the various criminological debates that are emerging over cybercrime. Essays examine the general problem of crime and the Internet, what is understood by the term 'cybercrime', the different types of cybercrimes, and the challenges they give rise to for both criminology and the criminal justice system.

... Read more

72. Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
by J. A. Hitchcock
Paperback: 459 Pages (2006-05-15)
list price: US$24.95 -- used & new: US$8.77
(price subject to change: see help)
Asin: 0910965722
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

As the number of Web users continues to swell, so do the numbers of online opportunists, con artists, and miscreants. Recognizing this danger, this book provides a reader-friendly guide that helps Web users identify, avoid, and survive online predators and protect their families. Detailing a broad range of abusive practices, ordinary computer users will share in victims' stories and advice on how to handle Spam, identify scams such as phishing, and deal with privacy invasion, financial scams, cyber stalking, and identity theft. Provided are tips, strategies, and techniques that can be put to immediate use, as well as laws, organizations, and Web resources that can aid victims and help them fight back.
... Read more

Customer Reviews (6)

5-0 out of 5 stars Insights and tips on preventing everything from identity theft to internet dating, newsgroup problems and more
This revised, expanded second edition of Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, And Con Artists comes from a cybercrime expert who provides easy, efficient methods for handling a wide range of online attacks. Himself a one-time victim of cyberstalking, Hitchcock became a victim's advocate and so doesn't come from a programmer's background. Her coverage therefore is most accessible to the lay consumer - the most likely victim of such crimes - and offers insights and tips on preventing everything from identity theft to internet dating, newsgroup problems and more.

5-0 out of 5 stars A must read for staying safe online!
This is the second edition of the previously read/critiqued Netcrimes and Misdemeanors book.

Once again, the author fills the pages with important and vital information about how to stay safe online. From scammers to hoaxes, stalkers and ebay, even online dating and keeping children safe from online predators, this book is packed with real life examples of how people made mistakes that made them a target for some online psycho. But not only does it have the mistakes that lead to the problem, it has the solutions and tricks to avoid the situation in the first place as well!

Both versions of this book are useful to anyone that surfs online, but I would urge people to get the second edition as it contains updated links and information. Learn to be safe online! Buy this book for yourself and anyone you know who's a newbie to the online world. You never know... it might just save their life.

5-0 out of 5 stars A Former Cybercrime Victim's Opinion

In general, the new information and new stories were woven amid the 1st edition information so well that there was no way to make any assumptions and skip along through. Just for the heck of it I tried! Then went back and thoroughly read the particular section and found that there was new stuff I'd missed. I did this intentionally a couple times to check. Gave up on the game and just kept reading! New stuff I *really* liked - the chapter on blogs, journals, etc. and the Nigerian Chapter. Even the Afterword was perfect. Just rightly written. Can't explain it other than it seemed to encompass the entirety of the book for you.

One (of many) of my favorite line(s). Intro, page 2, para.4, sentences 1 and 2.Buy the book and find out!

This book is excellent.







5-0 out of 5 stars I am so glad I bought this book
I had heard about the first edition of this book, but never bothered. I honestly thought I knew everything about being online. Then I had a bad experience and heard the 2nd edition was coming out. I bought it at the first chance I could and believe me, I have been kicking myself for not buying the first edition. All the advice given in this book is wonderful. I even found a situation similar to what happened to me and the advice was so simple, I couldn't believe it. Now this book sits next to my computer and I've found myself pulling it out to read about whatever I am doing online. Don't think you know everything - you don't! Trust me on this.

5-0 out of 5 stars A MUST HAVE for Moms!
Identity theft, forgery, harassment . . . its happens to thousands of people every day, children included.

It is estimated that more than sixty percent of children between the ages of 13 and 17 have a Myspace profile, my own children are included in that percentage.

I thought that frequent supervision, placing our computer in the kitchen, and an expensive computer software program would be sufficient to protect my children.I was wrong. With tips from this book, I quickly changed simple computer settings that could ultimately prevent my children, or myself, from becoming a cybercrime victim.

The details that Jayne Hitchcock includes in this book about victim prevention and the procedures to follow if you are victimized, are clear and to the point. A review of cybercrime laws, victim experiences, and the psyche of perpetrator motivation make this type of book, which could be otherwise boring, very interesting!

This book is a MUST HAVE for computer rookies, experts, high school students, and every Mom in America, including mine!
... Read more


73. Understanding Online Piracy: The Truth about Illegal File Sharing
by Nathan W. Fisk
Hardcover: 190 Pages (2009-06-08)
list price: US$39.95 -- used & new: US$26.95
(price subject to change: see help)
Asin: 0313354731
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

While the actual impact of digital piracy is nearly impossible to precisely calculate, the threat of financial damage from illegal peer-to-peer (P2P) file sharing to the world's highest-grossing entertainment firms (and even entire industries!) has garnered attention from government, industry, and academic leaders and criminal justice professionals. Oftentimes, those providing access to computers and file sharing capabilities-parents, schools, libraries-don't know about or understand these activities and, therefore, put themselves and their families at risk for criminal and civil prosecution. This work describes the technological, legal, social, and ethical facets of illegal peer-to-peer file sharing. Geared toward parents, teachers, librarians, students, and any other computer user engaged in file sharing, this book will help readers to understand all forms of traditional and digital copyright violations of protected music, movies, and software.

To date over 18,000 P2P users have been sued by the Recording Industry Association of America (RIAA). Most of these users have been college students and parents of high-school students. While word of these law suits are spreading, and many parents fear that their children may be using a family computer to illegally download and share copyrighted works, few supervising adults have the technical knowledge needed to determine whether and to what extent pirating may be occurring via a computer and Internet connection they are legally responsible for. Additionally, while P2P networks are filled with millions of users with billions of copyrighted files, few users understand the ways in which they are illegally using computers and other mobile electronic devices to download protected content. While describing both technical and social issues, this book primarily focuses on the social aspects of illegal file sharing, and provides technical concepts at a general level. Fisk skillfully condenses the complex nature of file sharing systems into an easy-to-understand guide, provides insight into the criminal justice approach to illegal file sharing, and offers guidance to parents and students who have concerns about potential legal action in response to file sharing activities.

... Read more

Customer Reviews (1)

5-0 out of 5 stars Critically important reading for anyone who is sending or receiving computer files
Today the computer is a ubiquitous part of every child's life in America. Just with most other commonly accessible technologies from the automobile to the telephone, there are ample opportunities for technologies to be used, abused, and misused. That's why laws, ethics, and mores must keep up with technological innovations within the lives of our children. Case in point - computer file sharing. The sharing of information from one child to another through the means of the computer and the internet to which they are linked. In an earlier technology of audio tape cassettes, the unauthorized reproduction of music was made illegal to protect the lawful copyrights of those who originally produced the music. In a subsequent decade, the unauthorized reproduction of videos was similarly banned to protect the copyrights of those who produced movies, concerts, documentaries, etc. In today's world, that same kind of prohibition has been codified into law to protect the intellectual property rights of those who create the content that is recorded on computer files from being unethically and unlawfully distributed without the express consent of those who own that file content. Of necessity, every new generation must be educated as to what copyright protections of intellectual property is such a critical necessity. That is the underlying purpose of "Understanding Online Piracy: The Truth About Illegal File Sharing" by computer crime and cyber safety expert Nathan W. Fisk. This comprehensive and up-to-date text covers all aspects of computer file sharing ranging from the technology involved to the legal consequences of unauthorized use and abuse of those files. Not only file users themselves would benefit from a careful reading of "Understanding Online Piracy", but also parents, teachers, librarians, and computer file content providers as well. Of special note is the perspective Nathan Fish provides concerning the social, economic, and technological consequences of illegal file sharing. Simply stated, "Understanding Online Piracy" is critically important reading for anyone who is sending or receiving computer files, and should be readily available in the collections of every highschool, college, university, and community library in the country. ... Read more


74. Cyberwars: Espionage on the Internet
by Jean Guisnel
Paperback: 296 Pages (1999-12-15)
list price: US$17.50 -- used & new: US$4.99
(price subject to change: see help)
Asin: 0738202606
Average Customer Review: 2.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
A revealing account of how the Internet has become a powerful new tool for spying by governments and private industry

To some a brand-new forum for the freedom of speech, the Internet is also the most up-to-date way to gather intelligence. Brilliant hackers like Kevin Mitnik-modern-day "pirates"-pose real security threats to government and industry. Cyberwars explores a dangerous new world where international terrorists plot their attacks and are tracked by secret service organizations on-line, drug traffickers do business and launder money, and electronic economic espionage is the order of the day. Examining efforts to police on-line communication and content, Guisnel assesses the implications of pervasive surveillance for the inherently democratic medium of the Internet. As these issues are the focus of ongoing debates in government and the private sector, Cyberwars couldn't be more timely.Amazon.com Review
Jean Guisnel, a journalist specializing in defense issues,takes a hard look at the controversies surrounding Internet security,striking a balance between the prophets of disaster and those whoinsist that everything is just fine. What's wonderful about this bookis that it's extremely readable, a series of stories told by ajournalist rather than a collection of dusty technical treatises. Withrefreshing clarity in both his outlook and his explanations, Guisnelpaints a realistic picture that is neither simplistically good norautomatically bad. The threats, he shows, are real enough: securityagencies willing to invade anyone's privacy, law enforcement agencieswilling to blink at their legal limitation, corporations that haveused cybertechnology to take industrial espionage to new heights, andnew breeds of viruses that can be transmitted in once-harmlessword-processor documents. But there is good news as well asbad. Battles for constitutional rights in cyberspace are being won andcryptographic improvements are making reasonable security easilyaccessible. And while attacks may be growing more clever, so aredefenses. There may well be cause for concern, but the greatestdanger, this book demonstrates, lies in remaining ignorant of theissues. ... Read more

Customer Reviews (4)

5-0 out of 5 stars D&M book review of CYBERWARS-ESPIONAGE ON The Internet
Cyberwars: Espionage on the Internet. By Jean Guisnel; published by Plenum Publishing, 800/221-9369 (phone), 212/647-1898 (fax); 296 pages; $26.95.

In the recent flood of cyberspace publications, this book at best adds a mere trickle to the literature. While the author presents some interesting perspectives on United States­French competition in industrial espionage (in fact, the book is translated into English from French), the faulty technical details present throughout ultimately sink this effort.

The author's disconnect with technology stands out in his discussion of the Clipper chip, which is now installed in most standalone voice encryptors sold in the United States--but in few other applications. The author contends that the National Security Agency proposes to add the chip to every telephone manufactured in the United States. This statement is both illogical and wrong. Analog phones, which can't take chips, continue to be widely manufactured because they are far more affordable than digital phones. Moreover, digital phones are generally hooked to analog lines and don't use encryption. Thus, installing Clipper in all phones makes no sense.

The author even confuses commonly known security details. In a discussion of phone phreaking, for example, he claims that the publication titled 2600 was named after the frequency generated by a quarter as it plunks into the slot in a pay phone. In fact, the publication's title derives from the frequency in hertz of a supervisory tone used to bypass toll equipment.

And in places the book lapses from a balanced discussion into political commentary. For example, after criticizing filtering programs that block access to pornographic and other objectionable Web sites, the author states that "The fun for those who devote themselves to censorship is the daily discovery of new sites that they can condemn and prohibit."

Instead of providing new material, this book is essentially a collection of accounts of computer intrusions previously published in newspapers. Security managers seeking a digest of hacking articles might find some value in this book, but it is not recommended for serious practitioners.

Reviewer: Gordon Mitchell, Ph.D., manages Future Focus, a Seattle-area company that gathers clues from hard disks for commercial clients. He is a member of ASIS. D&M company for scientific research

3-0 out of 5 stars European Perspective on Cyberwar
Jean, a nationally-respected journalist in France who has coveredespionage matters for decades, is the author of one of those rare Frenchbooks that make it into the U.S. marketplace.Translated into Englishafter great reviews in Europe, it charts the migration of European andAnglo-Saxon intelligence professionals into cyber-space.

1-0 out of 5 stars A pseudo-tech book written by someone who hasn't a clue.
This book is a lightweight in the recent flood of cyberscare publications.It presents some interesting perspectives on US-French competition in the world of industrial espionage but overall it is not very informative.Itsprincipal failing is that it is a book about technology that butcherstechnical details.

The author's disconnect with technology isdemonstrated in his discussion of the Clipper chip.Clipper is nowinstalled in most stand-alone voice encryptors that are sold in the US.Atthe beginning of each phone call a new session key is shared between thetwo callers.It is not practical to find this session key by guessing buta separately encrypted version is sent along with the conversation.Thesession key can be discovered by government agencies through appropriateprocedures.The author's discussion of this states that a NSA proposal"...would add a device called the clipper chip to every telephone orcomputer manufactured in the United States."For most phones that useanalog transmission of voice this would clearly make no sense.Apparentlythe author missed the issue entirely.

In places the book becomes more ofa political platform than a balanced discussion.After condemningfiltering programs that block access to porn sites he states that "Thefun for those who devote themselves to censorship is the daily discovery ofnew sites that they can condemn and prohibit"

Even commonly knownsecurity details are missed.In a discussion of phone phreaking the authorstates that the publication titled 2600 was named after the frequency thata quarter made when falling into a pay phone.2600 Hertz is actually thefrequency of a supervisory tone that was used to bypass tollequipment.

In an evaluation of the hacker Kevin Mitnick's his technicalabilities were rated as #2 in the world.I am personally aquatinted withassociates of Mitnick who state that he is a technical wannabe that excelsonlyin dumpster diving and social engineering.

[exerpted from a reviewfor Security Management -- all rights reserved by the author]

1-0 out of 5 stars Recommended?Click the 'Back' button.
I can hardly believe this book is recommended by the "Cyberculture Editor".It reads as though it reasearched by watching TV news programs and talk shows. Guisnel has a penchant for bombast and egaggeration: he makes no effort to back up a number of nebulous-yet-sweeping claims about the level of monitoring of the internet by security organizations (or a bunch of other claims, for that matter).Publishing a bunch of quotes don't prove jack.

In one glaringly ignorant sentence he infers that published bomb-recipies are a phenomenon perpetrated solely by right-wing militia groups. Huh. On the subject of internet policing he wanders from: the idea that governments should not, to the idea that the internet is a "self-policing nirvana", to wondering how laws to prevent nazis from having websites could be enforced. If you are a regular study of this topic you will not find anything new here.Despite the intruiging title, this guy has nothing to say. ... Read more


75. Creeping Failure: How We Broke the Internet and What We Can Do to Fix It
by Jeffrey Hunker
Kindle Edition: 288 Pages (2010-08-20)
list price: US$25.95
Asin: B00405R17G
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets, highways, and interchanges, lined with homes and businesses, playgrounds and theatres. We may not physically live in this city, but most of us spend a lot of time there, and even pay rents and fees to hold property in it.

But the Internet is not a city of the 21st century. Jeffrey Hunker, an internationally known expert in cyber-security and counter-terrorism policy, argues that the Internet of today is, in many ways, equivalent to the burgeoning cities of the early Industrial Revolution: teeming with energy but also with new and previously unimagined dangers, and lacking the technical and political infrastructures to deal with these problems. In a world where change of our own making has led to unexpected consequences, why have we failed, at our own peril, to address these consequences?

Drawing on his experience as a top expert in information security, Hunker sets out to answer this critical question in Creeping Failure. Hunker takes a close look at the "creeping failures" that have kept us in a state of cyber insecurity: how and why they happened, and most crucially, how they can be fixed. And he arrives at some stunning conclusions about the dramatic measures that we will need to accomplish this.

This groundbreaking book is an essential first step toward understanding the World Wide Web in a larger context as we try to build a safer Internet "city." But it also raises issues that are relevant far outside the online realm: for example, how can we work together to create not just new policy, but new kinds of policy? Creeping Failure calls for nothing less than a basic rethinking of the Internet — and of how we solve problems together.


From the Hardcover edition. ... Read more

Customer Reviews (3)

5-0 out of 5 stars Very interesting and easily readable book
This book is about cyber-security. I started to read it because of all the publicity in the news about cyber security, hacking etc, but expexted to have a problem followingit because I am not ver computer4 sophisticated. I was very pleasantle surprised to find the book written in a way easily understood by readers with litlle experience in that area. After finishing reading the book , I understood much better what the problem is and I was able to understand the author's suggester remedy. I highly recommend it

5-0 out of 5 stars The sky is sagging
Not falling.Anyone who tells you the sky is falling is trying to attract attention to him/herself, not the problem at hand; Jeffrey Hunker points us to the amorphous mess in the peripherals of anyone reading this review and gives us the specifics.Further, he takes care not to swamp his readers in jargon: when he needs to use some, clear and intelligent definitions are given; there's even a rather charming "Apology from the Author" just before he leads readers into the labyrinth of D.C. policy-making (which journey is a cautionary tale about how *anything* gets done at the federal executive level: the "overlaps and gaps" described are disquieting).

It's amazingly readable -- intelligent and conversational, with a field of reference from the 1912 Britannica to Bruce Willis movies, including reams of federal agency publications that we've paid for but don't know about: the reader is guided here by an Everyman with (I assume) a Phi-Bete and a pretty high security clearance; we go from botnets and cyber war to a brief fantasia on the back of President Clinton's head.

Hunker clearly makes the point that any new design for the Internet* should be addressed methodically and with care, not in frenzied reaction to catastrophe ("amid the hot fog of crisis," in one of Hunker's more resonant phrases); the sooner such work begins, the better.As a private citizen without any heft or expertise, I can follow the logic and be grateful for the elucidation, but can only hope that those with influence can be brought on board.People high up in the computer industry, as well as in the legislative and executive branches of government, probably know some of the issues Hunker addresses, but do their staffers?Perhaps some secular version of the Gideons can get copies of "Creeping Failure" into the restrooms of the Georgetown hot spots and in geek-havens from MIT to San José. . . .

* seeing as how this wondrous Internet we all use was NOT designed -- as Hunker gently but insistently points out -- for the mass use we put it to.

5-0 out of 5 stars An Outstandingly Readable Book on Cyber Security
An entertaining and lucid account of the threats facing the internet today, and intriguing and revolutionary proposals for solutions from cyber-security expert Jeffrey Hunker, formerly Senior Director for Critical Infrastructure Protection and of the staff of the National Security Council.From the very first page, Creeping Failure: How We Broke the Internet and What We Can Do to Fix It, draws its readers into the world of cyber security and by analogy and example reveals the complexities of the challenges facing internet security without resorting to technical jargon and gobbledegook.The intricacies of worms, viruses, bots, distributed denial of service attacks, spam, phishing, targeted penetrations and insider threats are all described for the lay reader as well as cyber threats as they relate to national security (espionage, war and terror).Hunker illustrates how cyber security is an issue for everyone, whether they are connected to the internet or not and asks his readers to consider what the appropriate roles for government and the private sector should be in devising a solution. Finally, he asks, if we were to create a new internet what should it look like and what would it cost?Creeping Failure is a must read for anyone interested in current affairs and the internet because in describing the challenges facing the cyber world it also describes the challenges and trade-offs we all face in contemporary society. ... Read more


76. Viruses and Spam (Cyber Citizenship and Cyber Safety)
by Dierdre Day-macleod
Library Binding: 48 Pages (2008-01-30)
list price: US$26.50 -- used & new: US$12.99
(price subject to change: see help)
Asin: 1404213511
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan

Customer Reviews (1)

4-0 out of 5 stars sign of our times?
It is a disturbing sign of our times that this book exists, aimed at the 9-12 year old reader. In carefully simple language, it explains the perils of viruses and spam. Computers are now so commonly used by kids in that age range that they are likely to encounter these things.

The intent is to educate them, and diminish the dangers. Given that viruses can propagate through email attachments and by various peer to peer networks. So it is not just email that can act as a vector of malware. ... Read more


77. Crime and Deviance in Cyberspace (International Library of Criminology, Criminal Justice and Penology- Second Series)
by David S. Wall
Hardcover: 624 Pages (2009-08-01)
list price: US$325.00 -- used & new: US$256.00
(price subject to change: see help)
Asin: 0754624536
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This volume presents the reader with an interesting and, at times, provocative selection of contemporary thinking about cybercrimes and their regulation. The contributions cover the years 2002-2007, during which period internet service delivery speeds increased a thousand-fold from 56kb to 56mb per second. When combined with advances in networked technology, these faster internet speeds not only made new digital environments more easily accessible, but they also helped give birth to a completely new generation of purely internet-related cybercrimes ranging from spamming, phishing and other automated frauds to automated crimes against the integrity of the systems and their content. In order to understand these developments, the volume introduces new cybercrime viewpoints and issues, but also a critical edge supported by some of the new research that is beginning to challenge and surpass the hitherto journalistically-driven news stories that were once the sole source of information about cybercrimes. ... Read more


78. Policing Cyberspace: A Structural and Cultural Analysis (Criminal Justice)
by Johnny Nhan
Library Binding: 216 Pages (2010-06-16)
list price: US$65.00 -- used & new: US$65.00
(price subject to change: see help)
Asin: 1593323980
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Nhan studies the policing of cybercrime in California. First-hand data is drawn from front-line cybercops (California's network of high-tech crimes task forces), the MPAA and motion picture studios, and high-tech companies, to explore structural, cultural, and various criminal justice issues in policing cyberspace. This research applies a nodal governance theoretical framework to map and assess social networks using the different actors involved in fighting cybercrime. Initial findings suggest collaborative security efforts are marred by inter-organizational frictions. Moreover, this security alliance must deal with digital media pirates, hostile hackers, and an unsympathetic public. ... Read more


79. Computer Forensics: Principles and Practices
by Linda Volonino, Reynaldo Anzaldua, Jana Godwin
Paperback: 552 Pages (2006-08-31)
list price: US$108.67 -- used & new: US$70.00
(price subject to change: see help)
Asin: 0131547275
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation

 

By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.   

... Read more

Customer Reviews (8)

3-0 out of 5 stars A revision is in order.
You can't really blame the publishers. By the time a book about computer technology is in print, it's already out of date. This one is no different. A couple of key points seemed to be missing (such as locking down USB devices in the registry and a decent discussion of Linux utilities). Subjects are glossed over, but not discussed in detail. I have other books that are better that are significantly less money.

4-0 out of 5 stars Great When Starting From Scratch
I liked the book. It opened my eyes to a lot of areas I knew nothing about. I can understand previous reviewers who weren't happy with the book. Some material is dated and it isn't an All-In-One text on the subject. But, if you're just starting out, like me, it is a great first read. Also, by actually doing the Projects in the back of each chapter, especially Chapter 7 and 8, you'll get a ton of information on very useful forensic topics and techniques including, software that you can download and use for free, etc...

If some websites for the software don't exist anymore, Google the names and the info on where to get it will come up. If you are into learning forensics, having to find this info shouldn't discourage you, otherwise you're learning the wrong subject.

I had a blast with this book and it really wet my appetite to learn more. What more could you want from an introductory text on any subject.

5-0 out of 5 stars A Great Computer Forensics Book
I used this as a textbook for my Forensics course. The contents and material in this book are very organized and accurate. It has all the essential infomation you need to know about the field of Computer Forensics. Several key points were summarized really well and right on targets. Highly recommended for readers.

5-0 out of 5 stars Informative, thorough and balanced
Best computer forensics book for non-technies. This book explains computer forensics, infosecurity and cyber-risks that managers, lawyers, and Internet users will be glad they knew about.

3-0 out of 5 stars Basic premise "Leave it to the experts"
This books gives some decent insite into the world of computer forensics if you have never touched on the subject before, but you certainly will not come away with the ability to perform computer forensics on your friends old hard drive. Leave that to the experts...

Helped me to provide my high school students to the introductory world of computer forensics and that was all I needed it to help me with. ... Read more


80. Web of Deception: Misinformation on the Internet
by Anne P. Mintz
Paperback: 278 Pages (2002-09-01)
list price: US$24.95 -- used & new: US$15.10
(price subject to change: see help)
Asin: 0910965609
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
As the Internet has become flooded with untrustworthy information, some of which is intentionally misleading or erroneous, this book teaches Web surfers how inaccurate data can affect their health, privacy, investments, business decisions, online purchases, and legal affairs. Bringing together the world's leading information-age observers, analysts, writers, and practitioners, this analysis reveals the Web as fertile ground for deception and misinformation. These experts provide hard-won advice on how to recognize misinformation in its myriad forms and disguises. Included are an array of tips on how to evaluate Web sites for quality and bias, checklists for navigating the Internet more effectively, and advice for those who have been duped. ... Read more

Customer Reviews (9)

3-0 out of 5 stars Good in principle, but somewhat dangerous and not well-researched
If we thought about where material comes from and who is producing it, it can be a slippery slope! A book the author cites in the very first page of the introduction (i.e. David Duke...) is a book all about how we should rebel against the information coming from Hollywood because it is mostly Jewish (as the Jews readily acknowledge) among other things. Further, she talks about Dr Martin Luther King Jr. and websites supposedly giving false information about him -- such as the fact that he plagiarized his doctoral thesis (among other writings). This is actually true. There was an inquest about it at his university, and they found entire pages lifted almost completely verbatim from another thesis and other sources. They decided not to revoke his PhD because of his reputation and because they said it "would serve no purpose". While the spirit and idea of this book is excellent, the authors do a bad job of verifying and researching the weighty issued they are addressing. FAR from simply attending to the intent of the websites, we need to still stick to FACTS! Intent is just one thing we have in our arsenal of deception-busting! FACTS are the MOST important! I was ironically left with a feeling that the authors did not just want facts, but had a political agenda which made the book one-sided. Facts, and objective truth can solve the world's problems, but only if we lose our biases all around -- even our own pet ones.

5-0 out of 5 stars Hopefully the next edition will have a chapter on Wikipedia!
This is an invaluable resource for information professionals in any realm, be it the corporate boardroom or the neighborhood public library. Its many contributors give insight into how the Internet is being used to disseminate information, and how online communities function. This book is not engendered by fear, but out of the reality that misinformation (erroneous information) and disinformation (malicious information) abounds on the Web, and real harm can be done. I hope that the editor and contributing authors will update it, given new trends in online communities, and the many changes in the world of search. If I may suggest the title: "Web 2.0 of Deception."

5-0 out of 5 stars A most important book of the Cyber Age
"Web of Deception" is a wake-up call to adult on-line users of the Internet and arguably the most important book of the Cyber Age to date. Its focus is on the deliberate deceptions on the Net that can wreak havok on your health, privacy, investments, purchases, business decisions, and legal affairs.

Editor Mintz and her collegial experts wrote the book not to scare but to empower Internet users to take control. "Web of Deception" should be required readingfor Internet users and in all computer classes. It can also be a valuable text in a course on the Dark Side of the Information Age.

5-0 out of 5 stars An Essential Book on an Important Topic
Web of Deception: Misinformation on the Internet is an essential read about a topic many of us deal with several times a day.

General search engines create the databases we search by finding what they can. No time is spent judging and analyzing the accuracy of the site or the reputation of the publisher. Fine, this is how general web search tools work but this is also why it's IMPORTANT that the searcher take a few moments and think about where the material is coming from and who is producing it.

Mintz has assembled an all-star roster of experts to provide the reader with the information and skills needed to recognize, understand, and deal with web credibility and authority issues.

5-0 out of 5 stars Vital to anyway using web-info!
This is an important collection of articles, written by people who have been leaders in analyzing information retrieval and content well before there was a web. This is an eye-opener
even for other experienced information professionals but it is especially important for people who are relying on the web as their source of personnel and professional information.

Rather than scaring folks from using the web, this book is an incredibly useful tool in helping individuals, other researchers, teachers, and business people to use the web more effectively.

Thanks to Anne Mintz and her colleagues for publishing this book and thanks to her employer for supporting her efforts in making us all more responsbile users of web information. ... Read more


  Back | 61-80 of 100 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

site stats