Matches in Harvard for { <http://id.lib.harvard.edu/aleph/001077298/catalog> ?p ?o. }
Showing items 1 to 21 of
21
with 100 items per page.
- catalog contributor b1222242.
- catalog created "c1983.".
- catalog date "1983".
- catalog date "c1983.".
- catalog dateCopyrighted "c1983.".
- catalog description "Bibliography: p. 339-342.".
- catalog description "pt. I. Computer abuse. An almost perfect crime ; Computer abuse research ; How much computer crime is there? -- pt. II. Computer crime methods. The problem of reporting computer vulnerabilities ; The benefits and dangers of describing criminal methods ; Sabotage ; Piggybacking and impersonation ; Data diddling ; Superzapping and scavenging ; Wiretapping ; Trapdoors, Trojan horses, and salamis ; Asynchronous attacks, logic bombs, and simulation -- pt. III. The new criminals. Computer criminals ; Amateurs, crazies, organizations, and foreign powers ; Career criminals ; Extreme advocates ; System hackers ; Revolt of the students ; The whiz kid ; The New York school gang ; Syscruncher and Vladimir ; The three terminaleers ; The misadventures of Cap'n Crunch ; Stopping the system hacker -- pt. IV. Ethical conflicts in computing. Fastest toes in the west ; The need for special ethics ; Conflict over obligations and implicit contracts ; Disputed rights to products ; Confidentiality of sensitive data ; Personal morality and organizational loyalty ; Responsibility for computer applications ; Responsibility owed to decision makers and the public -- pt. V. Computer crime in the law. Computer crime is crime ; Prosecutors, cops, and judges ; The law ; On charging computer crime -- pt. VI. Future vulnerabilities and risk reduction. The vulnerabilities of computerized society in Sweden ; Electronic funds transfer systems as a national vulnerability in the United States ; Vulnerability concerns and reactions throughout the world ; Risk reduction ; The functions of security ; Crypto, the premier safeguard ; Public key cryptosystems ; The ultimate secure computer network of the future.".
- catalog extent "xiii, 352 p. :".
- catalog hasFormat "Fighting computer crime.".
- catalog identifier "068417796X".
- catalog isFormatOf "Fighting computer crime.".
- catalog issued "1983".
- catalog issued "c1983.".
- catalog language "eng".
- catalog publisher "New York : Scribner,".
- catalog relation "Fighting computer crime.".
- catalog subject "Computer crimes Prevention.".
- catalog subject "HV6773.C65 P37 1983".
- catalog tableOfContents "pt. I. Computer abuse. An almost perfect crime ; Computer abuse research ; How much computer crime is there? -- pt. II. Computer crime methods. The problem of reporting computer vulnerabilities ; The benefits and dangers of describing criminal methods ; Sabotage ; Piggybacking and impersonation ; Data diddling ; Superzapping and scavenging ; Wiretapping ; Trapdoors, Trojan horses, and salamis ; Asynchronous attacks, logic bombs, and simulation -- pt. III. The new criminals. Computer criminals ; Amateurs, crazies, organizations, and foreign powers ; Career criminals ; Extreme advocates ; System hackers ; Revolt of the students ; The whiz kid ; The New York school gang ; Syscruncher and Vladimir ; The three terminaleers ; The misadventures of Cap'n Crunch ; Stopping the system hacker -- pt. IV. Ethical conflicts in computing. Fastest toes in the west ; The need for special ethics ; Conflict over obligations and implicit contracts ; Disputed rights to products ; Confidentiality of sensitive data ; Personal morality and organizational loyalty ; Responsibility for computer applications ; Responsibility owed to decision makers and the public -- pt. V. Computer crime in the law. Computer crime is crime ; Prosecutors, cops, and judges ; The law ; On charging computer crime -- pt. VI. Future vulnerabilities and risk reduction. The vulnerabilities of computerized society in Sweden ; Electronic funds transfer systems as a national vulnerability in the United States ; Vulnerability concerns and reactions throughout the world ; Risk reduction ; The functions of security ; Crypto, the premier safeguard ; Public key cryptosystems ; The ultimate secure computer network of the future.".
- catalog title "Fighting computer crime / Donn B. Parker.".
- catalog type "text".