0
Your cart

Your cart is empty

Books > Social sciences > Sociology, social studies > Crime & criminology > Causes & prevention of crime

Not currently available

Fighting Computer Crime - A New Framework for Protecting Information (Paperback, New) Loot Price: R681
Discovery Miles 6 810
You Save: R93 (12%)
Fighting Computer Crime - A New Framework for Protecting Information (Paperback, New): DB Parker

Fighting Computer Crime - A New Framework for Protecting Information (Paperback, New)

DB Parker

 (sign in to rate)
List price R774 Loot Price R681 Discovery Miles 6 810 | Repayment Terms: R64 pm x 12* You Save R93 (12%)

Bookmark and Share

Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available.

The author of Crime by Computer (1976) - and, subsequently, "four other major works" bearing on the subject - here provides a dossier on computer abuses chiefly designed, it appears, to allay fears of computerization by down-playing "computer crime" and downgrading computer diddling. The book is so murky and choppy, however, that few are likely to penetrate very far. To start with, we have an epigraph from IBM: "The Computer didn't do it." Then Parker assures us that "computer crime is relatively rare when compared with other crime." "As computers proliferate," moreover, "I anticipate that adequate security measures will be planned and implemented." (How he and his employer do this, we later hear.) In the leadoff case, a financial fraud perpetrated by a computer expert, "computers were not essential to the crime. The news media called it a computer crime because most reporters don't know the difference" (and they know the public responds). Then, 13 technical computer-crime methods are described (piggybacking, superzapping, wiretapping, etc.), along with safeguards against them. Various types of "computer criminals" are discussed, along with the need to reform them. (Students must learn that "the computer is sacrosanct"; the "common rationalization" that the use of idle services is harmless must be exposed.) Other brief chapters take up the weaknesses of existing laws, the problems of Electronic Funds Transfer security, etc. Computer security itself is divided into five "layers," six "functions," and assorted "safeguards." The book's real subject, in fact, is computer security; for public concerns - from individual privacy to national security - and for tales of computer crime, readers will have to look elsewhere (including Burnham, above, and Pool, below). (Kirkus Reviews)
Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he reveals:
* Who your greatest security threats really are (be prepared for some surprises!)
* Why employees undergoing divorce can be your organization's greatest computer security risk
* How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems.
* Effective countermeasures for each threat covered in the book
* How to neutralize even the most powerful cybercrime scheme attempts
* Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized

General

Imprint: John Wiley & Sons
Country of origin: United States
Release date: September 1998
First published: September 1998
Authors: DB Parker
Dimensions: 233 x 189 x 22mm (L x W x T)
Format: Paperback
Pages: 528
Edition: New
ISBN-13: 978-0-471-16378-7
Categories: Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Books > Social sciences > Sociology, social studies > Crime & criminology > Causes & prevention of crime
Promotions
LSN: 0-471-16378-3
Barcode: 9780471163787

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Light Through The Bars - Understanding…
Babychan Arackathara Paperback R30 R28 Discovery Miles 280
Life Sentence - The Brief And Tragic…
Mark Bowden Paperback R449 R426 Discovery Miles 4 260
Leo's Guide To Not Becoming A Statistic…
Leo Prinsloo Paperback R265 R224 Discovery Miles 2 240
Female Fear Factory
Pumla Gqola Paperback R335 R314 Discovery Miles 3 140
Advanced Introduction to Applied Green…
Rob White Paperback R649 Discovery Miles 6 490
Violence - Reflections on Our Deadliest…
James Gilligan Paperback R1,373 Discovery Miles 13 730
Youth Violence - Prevention…
Daniel J. Flannery, C.Ronald Huff Hardcover R2,228 R2,080 Discovery Miles 20 800
Strategic perspectives on crime and…
J. Burger Paperback  (1)
R618 Discovery Miles 6 180
The Carmarthen Murders - The start of a…
John Nicholl Hardcover R687 Discovery Miles 6 870
Advanced Introduction to Applied Green…
Rob White Hardcover R2,795 Discovery Miles 27 950
Rough Diamonds - The BRAND NEW gritty…
Gillian Godden Hardcover R689 Discovery Miles 6 890
Survivor - A shocking, page-turning…
Ross Greenwood Hardcover R687 Discovery Miles 6 870

See more

Partners