Logo

The Transnational Dimension of Cyber Crime and Terrorism

Large book cover: The Transnational Dimension of Cyber Crime and Terrorism

The Transnational Dimension of Cyber Crime and Terrorism
by

Publisher: Hoover Institution Press
ISBN/ASIN: 0817999825
ISBN-13: 9780817999827
Number of pages: 292

Description:
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists—and the number, cost, and sophistication of the attacks are increasing at alarming rates. With annual damage around the world now measured in billions of U.S. dollars, these attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology to conduct business, carry messages, and process information.

Home page url

Download or read it online for free here:
Read online
(online reading)

Similar books

Book cover: Approaching ZeroApproaching Zero
by - ManyBooks
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers.
(9556 views)
Book cover: Lessons from the Identity TrailLessons from the Identity Trail
by - Oxford University Press
The authors explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
(14644 views)
Book cover: How to Become Anonymous, Secure and Free OnlineHow to Become Anonymous, Secure and Free Online
by - Smashwords
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources.
(4789 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(20479 views)