e99 Online Shopping Mall
Help | |
Home - Basic C - Computer & Internet Crime (Books) |
  | Back | 61-80 of 100 | Next 20 |
click price to see details click image to enlarge click link to go to the store
61. Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems by Lin Liu | |
Hardcover: 508
Pages
(2008-01-29)
list price: US$180.00 -- used & new: US$176.00 (price subject to change: see help) Asin: 1599045915 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems discusses leading research on the use of computer simulation of crime patterns to reveal hidden processes of urban crimes, taking an interdisciplinary approach by combining criminology, computer simulation, and geographic information systems into one comprehensive resource. |
62. Cybercrime: Digital Cops in a Networked Environment (Ex Machina: Law, Technology, and Society) by J. M. Balkin | |
Paperback: 272
Pages
(2007-03-01)
list price: US$23.00 -- used & new: US$18.92 (price subject to change: see help) Asin: 0814799833 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description The Internet has dramatically altered the landscape of crime and national security, creating new threats, such as identity theft, computer viruses, and cyberattacks. Moreover, because cybercrimes are often not limited to a single site or nation, crime scenes themselves have changed. Consequently, law enforcement must confront these new dangers and embrace novel methods of prevention, as well as produce new tools for digital surveillance—which can jeopardize privacy and civil liberties. Cybercrime brings together leading experts in law, criminal justice, and security studies to describe crime prevention and security protection in the electronic age. Ranging from new government requirements that facilitate spying to new methods of digital proof, the book is essential to understand how criminal law—and even crime itself—have been transformed in our networked world. Contributors: Jack M. Balkin, Susan W. Brenner, Daniel E. Geer, Jr., James Grimmelmann, Emily Hancock, Beryl A. Howell, Curtis E.A. Karnow, Eddan Katz, Orin S. Kerr, Nimrod Kozlovski, Helen Nissenbaum, Kim A. Taipale, Lee Tien, Shlomit Wagman, and Tal Zarsky. Customer Reviews (1)
Informative! |
63. Internet Safety (Reference Shelf) | |
Paperback: 176
Pages
(2009-04)
list price: US$50.00 -- used & new: US$4.66 (price subject to change: see help) Asin: 0824210891 Canada | United Kingdom | Germany | France | Japan | |
64. The Personal Internet Security Guidebook: Keeping Hackers and Crackers out of Your Home (The Korper and Ellis E-Commerce Books Series) by Tim Speed, Juanita Ellis, Steffano Korper | |
Paperback: 202
Pages
(2001-10-19)
list price: US$73.95 -- used & new: US$14.50 (price subject to change: see help) Asin: 0126565619 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (5)
The personal Internet security guidebook
Home router protection
Hackers at the door
An appalling mess! The text appears not to have been edited, or even proof-read:In a chapter describing the history of the Internet, Vinton Cerf is sometimes "Cert" and sometimes "Cerf," even on the same page!In one case, the author states "So Cerf (yes dudes, not SERF!) and Kahn developed a new protocol..." and a few paragraphs later, "You see, the original model that Cert and Kahn put together...."(P.11).These quotes also give a good taste of the author's writing style, which might be described as "faux au courant." Beyond that, the material is very disorganized.Every page seems to be peppered with seemingly random footnotes, often providing trivial information, while many obscure acronyms are never even explained at all. The book is 200 pages long, much of it taken up with screenshots and diagrams. 40 of those pages are devoted to a list of security-related hardware and software tools with descriptions obviously copied from the vendor's advertising materials, and much of it already out-of-date.The foreword is by the CEO of Linksys. whose products are featured in many screenshots, and who is further flattered with a 2/3 page bio (more than is devoted to all three authors combined on the back cover), leading me to believe that the book is a Linksys commission with some additional support from the other sources mentioned. The book is a quick read, and it might appeal to the dumb and dumber crowd, but I wouldn't trust it or recommend it for anyone else.
Good Simple Easy to understand |
65. Internet Besieged: Countering Cyberspace Scofflaws by Dorothy E. Denning, Peter J. Denning | |
Paperback: 560
Pages
(1997-10-13)
list price: US$39.95 -- used & new: US$5.00 (price subject to change: see help) Asin: 0201308207 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
There is better
A well rounded primer to this important topic This is a collection of thirty essays covering a variety of aspects of information security written well known American commentators. The 1998 publication date on this book is slightly misleading since some of the essays contained within it date back to 1992. The majority of the papers date from 1996. But this should not seriously deter the reader since the many of the articles are likely to become the foundation texts of the industry and stand the test of time and distance. The first of the book's five sections covers the background of the Internet from a security perspective. The second focuses on the weaknesses of Internet-connected computer systems and shows how criminals exploit them. Part 3, details the cryptographic methods available to help secure systems, while the fourth section explores the particular challenges of electronic commerce. The final section looks at the larger and non- technical issues of Internet practices, laws, and policies. The first section is a well balanced picture of the Internet as it stands today . The best parts are theoverview chapters by Peter Denning "The Internet After Thirty Years" and Dorothy E. Denning "Cyberspace Attacks and Countermeasures" The second section on Internet Security is less interesting as too many of the papers are unnecessarily technical-better analysis can of the problem can be found in some computer science text books. The book is strongest, naturally given its main authors, in the cryptographic section - although I still prefer Bruce Schneier's "Applied Cryptography" for an overview of the subject. The electronic commerce section is completely out of date - a great deal has happened in the two years since it was written. But the final section has three interesting papers by Dorothy E. Denning "Encryption Policy and Market Trends" (which should be required reading for anyone wishing!to take issue with the DTI's proposals on encryption and key escrow anda couple of nice essays by Bruce Sterling on legal and ethical issues. This is a good book to dip into to get ideas on computer security. The bibliographies are thorough and the tone, in the main, is light but authoritative. Alistair KELMAN ... Read more |
66. Superhighway Robbery: Preventing E-Commerce Crime (Crime Science) by Graeme R. Newman, R. V. G. Clarke | |
Hardcover: 256
Pages
(2003-08)
list price: US$69.95 -- used & new: US$51.03 (price subject to change: see help) Asin: 1843920182 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
67. System Crash (Internet Detectives) by Michael Coleman | |
Paperback: 128
Pages
(1998-03-09)
list price: US$3.99 -- used & new: US$3.94 (price subject to change: see help) Asin: 0553486543 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
Not bad at all!
Really good book! That's the blackmail threat. Is it a hoax? Or will famous theme-park rides really start to become death traps? As they head off on their theme-park vacation, Josh Allan, Tamsyn Smith, and Rob Zanelli hope it's a hoax. But a frightening incident proves it's not. With the help of their friends on the Net, the must find the unknown blackmailer-before someone gets killed....Oh, yeah. Tom and Josh meet each other. It's a long story as Josh said in the book. Also, is this the end of Internet Detectives? This series is really short then! There are only 5 books in it! I hope there will be more books. Because usually in the back, it tells what the next book will be about. But this time they didn't....They also put in the back cover: Surf all the titles in INTERNET DETECTIVES for more cybermysteries! But they usually put the next title.... ... Read more |
68. Ultimate Internet Outlaw: How Surfers Steal Sex, Software, Cds, Games, And More Top-Secret Stuff On The Information Superhighway by Robert Merkle | |
Paperback: 96
Pages
(1999-05)
list price: US$15.00 -- used & new: US$12.58 (price subject to change: see help) Asin: 1581600291 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (5)
Don't waste your money on this book.
Not ... worth my time. Seriously, don't spend your money on this book. If you are relatively new to the internet, get yourself one of those "
Ultimate Internet Outlaw (not!)
Good, but will get outdated fast since the net is changing. Theauthor assumes you know such things as how to use compression tools (.ZIPformat), what an internet service provider (ISP) is and how to openmultiple broaswers, he takes off from there with pretty detailedinformation on how to steal, hack and basically get web stuff free. Thelanguage gets kinda raw at some points, it was written in a way to keep theadult reader interested, but it is NOT for the kiddies. The DownSide: The language is a bit harsh as mentioned above, and the materialwill soon be dated since the net and computers change so fast, but it is agood up-to-date resource right now.
I bought this book off Amazon.com.It is a truly must read! |
69. Cyberspace Crime (International Library of Criminology, Criminal Justice & Penology.) | |
Hardcover: 500
Pages
(2003-06)
list price: US$340.00 -- used & new: US$340.00 (price subject to change: see help) Asin: 0754621901 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
70. Music Piracy and Crime Theory (Criminal Justice: Recent Scholarship) by Sameer Hinduja | |
Hardcover: 218
Pages
(2005-11-20)
list price: US$60.00 -- used & new: US$42.49 (price subject to change: see help) Asin: 1593321244 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
71. Crime and the Internet by David S.Wall | |
Kindle Edition: 240
Pages
(2007-03-20)
list price: US$51.95 Asin: B000OT85UY Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description We have seen the astounding potential of the Internet as an informational tool, but we are also beginning to encounter the infinite questions it unfurls about legal issues and crimes committed with its aid.David Wall and his stellar cast of contributors address the various criminological debates that are emerging over cybercrime. Essays examine the general problem of crime and the Internet, what is understood by the term 'cybercrime', the different types of cybercrimes, and the challenges they give rise to for both criminology and the criminal justice system. |
72. Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists by J. A. Hitchcock | |
Paperback: 459
Pages
(2006-05-15)
list price: US$24.95 -- used & new: US$8.77 (price subject to change: see help) Asin: 0910965722 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (6)
Insights and tips on preventing everything from identity theft to internet dating, newsgroup problems and more
A must read for staying safe online!
A Former Cybercrime Victim's Opinion
I am so glad I bought this book
A MUST HAVE for Moms! |
73. Understanding Online Piracy: The Truth about Illegal File Sharing by Nathan W. Fisk | |
Hardcover: 190
Pages
(2009-06-08)
list price: US$39.95 -- used & new: US$26.95 (price subject to change: see help) Asin: 0313354731 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description While the actual impact of digital piracy is nearly impossible to precisely calculate, the threat of financial damage from illegal peer-to-peer (P2P) file sharing to the world's highest-grossing entertainment firms (and even entire industries!) has garnered attention from government, industry, and academic leaders and criminal justice professionals. Oftentimes, those providing access to computers and file sharing capabilities-parents, schools, libraries-don't know about or understand these activities and, therefore, put themselves and their families at risk for criminal and civil prosecution. This work describes the technological, legal, social, and ethical facets of illegal peer-to-peer file sharing. Geared toward parents, teachers, librarians, students, and any other computer user engaged in file sharing, this book will help readers to understand all forms of traditional and digital copyright violations of protected music, movies, and software. To date over 18,000 P2P users have been sued by the Recording Industry Association of America (RIAA). Most of these users have been college students and parents of high-school students. While word of these law suits are spreading, and many parents fear that their children may be using a family computer to illegally download and share copyrighted works, few supervising adults have the technical knowledge needed to determine whether and to what extent pirating may be occurring via a computer and Internet connection they are legally responsible for. Additionally, while P2P networks are filled with millions of users with billions of copyrighted files, few users understand the ways in which they are illegally using computers and other mobile electronic devices to download protected content. While describing both technical and social issues, this book primarily focuses on the social aspects of illegal file sharing, and provides technical concepts at a general level. Fisk skillfully condenses the complex nature of file sharing systems into an easy-to-understand guide, provides insight into the criminal justice approach to illegal file sharing, and offers guidance to parents and students who have concerns about potential legal action in response to file sharing activities. Customer Reviews (1)
Critically important reading for anyone who is sending or receiving computer files |
74. Cyberwars: Espionage on the Internet by Jean Guisnel | |
Paperback: 296
Pages
(1999-12-15)
list price: US$17.50 -- used & new: US$4.99 (price subject to change: see help) Asin: 0738202606 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description To some a brand-new forum for the freedom of speech, the Internet is also the most up-to-date way to gather intelligence. Brilliant hackers like Kevin Mitnik-modern-day "pirates"-pose real security threats to government and industry. Cyberwars explores a dangerous new world where international terrorists plot their attacks and are tracked by secret service organizations on-line, drug traffickers do business and launder money, and electronic economic espionage is the order of the day. Examining efforts to police on-line communication and content, Guisnel assesses the implications of pervasive surveillance for the inherently democratic medium of the Internet. As these issues are the focus of ongoing debates in government and the private sector, Cyberwars couldn't be more timely. Customer Reviews (4)
D&M book review of CYBERWARS-ESPIONAGE ON The Internet In the recent flood of cyberspace publications, this book at best adds a mere trickle to the literature. While the author presents some interesting perspectives on United StatesFrench competition in industrial espionage (in fact, the book is translated into English from French), the faulty technical details present throughout ultimately sink this effort. The author's disconnect with technology stands out in his discussion of the Clipper chip, which is now installed in most standalone voice encryptors sold in the United States--but in few other applications. The author contends that the National Security Agency proposes to add the chip to every telephone manufactured in the United States. This statement is both illogical and wrong. Analog phones, which can't take chips, continue to be widely manufactured because they are far more affordable than digital phones. Moreover, digital phones are generally hooked to analog lines and don't use encryption. Thus, installing Clipper in all phones makes no sense. The author even confuses commonly known security details. In a discussion of phone phreaking, for example, he claims that the publication titled 2600 was named after the frequency generated by a quarter as it plunks into the slot in a pay phone. In fact, the publication's title derives from the frequency in hertz of a supervisory tone used to bypass toll equipment. And in places the book lapses from a balanced discussion into political commentary. For example, after criticizing filtering programs that block access to pornographic and other objectionable Web sites, the author states that "The fun for those who devote themselves to censorship is the daily discovery of new sites that they can condemn and prohibit." Instead of providing new material, this book is essentially a collection of accounts of computer intrusions previously published in newspapers. Security managers seeking a digest of hacking articles might find some value in this book, but it is not recommended for serious practitioners. Reviewer: Gordon Mitchell, Ph.D., manages Future Focus, a Seattle-area company that gathers clues from hard disks for commercial clients. He is a member of ASIS. D&M company for scientific research
European Perspective on Cyberwar
A pseudo-tech book written by someone who hasn't a clue. The author's disconnect with technology isdemonstrated in his discussion of the Clipper chip.Clipper is nowinstalled in most stand-alone voice encryptors that are sold in the US.Atthe beginning of each phone call a new session key is shared between thetwo callers.It is not practical to find this session key by guessing buta separately encrypted version is sent along with the conversation.Thesession key can be discovered by government agencies through appropriateprocedures.The author's discussion of this states that a NSA proposal"...would add a device called the clipper chip to every telephone orcomputer manufactured in the United States."For most phones that useanalog transmission of voice this would clearly make no sense.Apparentlythe author missed the issue entirely. In places the book becomes more ofa political platform than a balanced discussion.After condemningfiltering programs that block access to porn sites he states that "Thefun for those who devote themselves to censorship is the daily discovery ofnew sites that they can condemn and prohibit" Even commonly knownsecurity details are missed.In a discussion of phone phreaking the authorstates that the publication titled 2600 was named after the frequency thata quarter made when falling into a pay phone.2600 Hertz is actually thefrequency of a supervisory tone that was used to bypass tollequipment. In an evaluation of the hacker Kevin Mitnick's his technicalabilities were rated as #2 in the world.I am personally aquatinted withassociates of Mitnick who state that he is a technical wannabe that excelsonlyin dumpster diving and social engineering. [exerpted from a reviewfor Security Management -- all rights reserved by the author]
Recommended?Click the 'Back' button. In one glaringly ignorant sentence he infers that published bomb-recipies are a phenomenon perpetrated solely by right-wing militia groups. Huh. On the subject of internet policing he wanders from: the idea that governments should not, to the idea that the internet is a "self-policing nirvana", to wondering how laws to prevent nazis from having websites could be enforced. If you are a regular study of this topic you will not find anything new here.Despite the intruiging title, this guy has nothing to say. ... Read more |
75. Creeping Failure: How We Broke the Internet and What We Can Do to Fix It by Jeffrey Hunker | |
Kindle Edition: 288
Pages
(2010-08-20)
list price: US$25.95 Asin: B00405R17G Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (3)
Very interesting and easily readable book
The sky is sagging
An Outstandingly Readable Book on Cyber Security |
76. Viruses and Spam (Cyber Citizenship and Cyber Safety) by Dierdre Day-macleod | |
Library Binding: 48
Pages
(2008-01-30)
list price: US$26.50 -- used & new: US$12.99 (price subject to change: see help) Asin: 1404213511 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Customer Reviews (1)
sign of our times? |
77. Crime and Deviance in Cyberspace (International Library of Criminology, Criminal Justice and Penology- Second Series) by David S. Wall | |
Hardcover: 624
Pages
(2009-08-01)
list price: US$325.00 -- used & new: US$256.00 (price subject to change: see help) Asin: 0754624536 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
78. Policing Cyberspace: A Structural and Cultural Analysis (Criminal Justice) by Johnny Nhan | |
Library Binding: 216
Pages
(2010-06-16)
list price: US$65.00 -- used & new: US$65.00 (price subject to change: see help) Asin: 1593323980 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
79. Computer Forensics: Principles and Practices by Linda Volonino, Reynaldo Anzaldua, Jana Godwin | |
Paperback: 552
Pages
(2006-08-31)
list price: US$108.67 -- used & new: US$70.00 (price subject to change: see help) Asin: 0131547275 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics. Customer Reviews (8)
A revision is in order.
Great When Starting From Scratch
A Great Computer Forensics Book
Informative, thorough and balanced
Basic premise "Leave it to the experts" |
80. Web of Deception: Misinformation on the Internet by Anne P. Mintz | |
Paperback: 278
Pages
(2002-09-01)
list price: US$24.95 -- used & new: US$15.10 (price subject to change: see help) Asin: 0910965609 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (9)
Good in principle, but somewhat dangerous and not well-researched
Hopefully the next edition will have a chapter on Wikipedia!
A most important book of the Cyber Age Editor Mintz and her collegial experts wrote the book not to scare but to empower Internet users to take control. "Web of Deception" should be required readingfor Internet users and in all computer classes. It can also be a valuable text in a course on the Dark Side of the Information Age.
An Essential Book on an Important Topic General search engines create the databases we search by finding what they can. No time is spent judging and analyzing the accuracy of the site or the reputation of the publisher. Fine, this is how general web search tools work but this is also why it's IMPORTANT that the searcher take a few moments and think about where the material is coming from and who is producing it. Mintz has assembled an all-star roster of experts to provide the reader with the information and skills needed to recognize, understand, and deal with web credibility and authority issues.
Vital to anyway using web-info! Rather than scaring folks from using the web, this book is an incredibly useful tool in helping individuals, other researchers, teachers, and business people to use the web more effectively. Thanks to Anne Mintz and her colleagues for publishing this book and thanks to her employer for supporting her efforts in making us all more responsbile users of web information. ... Read more |
  | Back | 61-80 of 100 | Next 20 |