Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
5.6 References
“Section A: The Nature and Definition of a Critical Infrastructure” http://www.nipc.gov/nipcfaq.html.
Joseph M. Kizza. Computer Network Security and Cyber Ethics. North Calorina. McFarland, 2001.
Karen Forchet. Computer Security Management. Boyd & Frasher Publishing, 1994.
Timeline of Hacking.
http://fyi.cnn.com/fyi/interactive/school.tools/timelines/1999/computer.hacking/frameset.exclude.html
Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. New York: ACM Press, 1990.
Louis J. Freeh. “FBI Congressional Report on Cybercrime”. http://www.fbi.gov/congress00/cyber021600.htm.
Steven Levy. Hackers: Heroes of the Computer Revolution, Penguin Books, 1984.
Security in Cyberspace: U.S. Senate Permanent Subcommittee on Investigations. June 5, 1996.
John Christensen. “Bracing for Guerilla Warfare in Cyberspace.” CNN Interactive, April 6, 1999.
Carnige-Mellon University. CERT Coordination Center. “CERT/CC Statistics 1998–1999”. http://www.cert.org/stats/certstats.html
David S. Alberts. “Information Warfare and Deterrence-Appendix D: Defensive War: Problem Formation and Solution Approach.” http://www.ndu.edu/inns/books/ind/appd.htm.
“Hacker Sittings and News: Computer Attacks Spreading (11/19/99)” http://www.infowav.com/hacker/99/hack-11/1999-b.shtml.
Marcus J. Tanum.” Network Forensics: Network Traffic Monitoring.” http://www.nfr.net/forum/publications/monitor.html
Intrusion Detection: FAQ, vl.33: What is Network-based Intrusion Detection?” http://www.sans.org/newlook/resources/IDFAQ/network-based.html
Steve Jackson. “ESM NetRecon: Ultrascan” http://www.si.com.au/Appendix/NetRecon%20Ultrascan%20technology.html
“Annual Cost of Computer Crime Rise Alarmingly” Computer Security Institute. http://www.gocsi.com/prela11.html.
Trigaux, R., “Hidden Dangers.”, St. Petersburg Times, June 16, 1998.
“Glossary of Vulnerability Testing Terminology”. http://www.ee.oulu.fi/research/ouspg/sage/glossary/
Joseph M. Kizza. Social and Ethical Issues in the Information Age. 2nd edition. New York: Springer, 2003.
“Anatomy of an attack” The Economist, February 19–25, 2000
“Cybercrime threat ‘real and growing'”. http://news.bbc.co.uk/2/hi/science/nature/978163.stm
Denning, Dorothy. ‘Activism, Hacktivism, and Cyberterrorisim: The Internet as a Tool or Influencing Foreign Policy”. http://www.nautilus.og/info-policy/workshop/papers/denning.html.
Lemos, Robert. “Online vandals smoke New York Times site”. CNET News.com. http://news.com.com/2009-1001-252754.html.
Shachtman, Noah. “Hacktivists Stage Virtual Sit-In at WEF Web site”. AlterNet. http://www.alternet.org/story.html?StoryID=12374.
Michelle Slatalla. “A brief History of Hacking” http://tlc.discovery.com/convergence/hackers/articles/history.html
“Phone Phreaking: The Telecommunications Underground” http://telephonetribute.com/phonephreaking.html.
Ron Rosenbaum. “Secrets of the Little Blue Box.” http://www.webcrunchers.com/crunch/esq-art.html.
“The Complete History of Hacking” http://www.wbglinks.net/pages/history/
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Cyber Crimes and Hackers. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_5
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)