In this Book

Cybercrime and the Law
buy this book Buy This Book in Print
summary
The first full-scale overview of cybercrime, law, and policy The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical differences that have long distinguished crime from terrorism and both from warfare.

Table of Contents

  1. Cover
  2. restricted access Download |
  1. Title Page, Copyright
  2. restricted access Download |
  1. Contents
  2. restricted access Download |
  1. Introduction: Twenty-First-Century Bonnie and Clyde
  2. pp. 1-15
  3. restricted access Download |
  1. 1. Hacking
  2. pp. 16-35
  3. restricted access Download |
  1. 2. Malware and DDOs Attacks
  2. pp. 36-56
  3. restricted access Download |
  1. 3. Cybercrimes against Property
  2. pp. 57-92
  3. restricted access Download |
  1. 4. Cybercrimes against Persons
  2. pp. 93-117
  3. restricted access Download |
  1. 5. Cyber CSI: The Evidentiary Challenges of Digital Crime Scenes
  2. pp. 118-140
  3. restricted access Download |
  1. 6. Cybercrime Investigations and Privacy
  2. pp. 141-170
  3. restricted access Download |
  1. 7. Transnational Investigation of Cybercrime
  2. pp. 171-188
  3. restricted access Download |
  1. 8. Mutating Cyberthreats: Crime, Terrorism, and War
  2. pp. 189-216
  3. restricted access Download |
  1. Epilogue
  2. pp. 217-219
  3. restricted access Download |
  1. Notes
  2. pp. 221-254
  3. restricted access Download |
  1. Index
  2. pp. 255-263
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.