In this Book

buy this book Buy This Book in Print
summary
The first full-scale overview of cybercrime, law, and policy The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical differences that have long distinguished crime from terrorism and both from warfare.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page, Copyright
  2. restricted access
    • Download PDF Download
  1. Contents
  2. restricted access
    • Download PDF Download
  1. Introduction: Twenty-First-Century Bonnie and Clyde
  2. pp. 1-15
  3. restricted access
    • Download PDF Download
  1. 1. Hacking
  2. pp. 16-35
  3. restricted access
    • Download PDF Download
  1. 2. Malware and DDOs Attacks
  2. pp. 36-56
  3. restricted access
    • Download PDF Download
  1. 3. Cybercrimes against Property
  2. pp. 57-92
  3. restricted access
    • Download PDF Download
  1. 4. Cybercrimes against Persons
  2. pp. 93-117
  3. restricted access
    • Download PDF Download
  1. 5. Cyber CSI: The Evidentiary Challenges of Digital Crime Scenes
  2. pp. 118-140
  3. restricted access
    • Download PDF Download
  1. 6. Cybercrime Investigations and Privacy
  2. pp. 141-170
  3. restricted access
    • Download PDF Download
  1. 7. Transnational Investigation of Cybercrime
  2. pp. 171-188
  3. restricted access
    • Download PDF Download
  1. 8. Mutating Cyberthreats: Crime, Terrorism, and War
  2. pp. 189-216
  3. restricted access
    • Download PDF Download
  1. Epilogue
  2. pp. 217-219
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 221-254
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 255-263
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.