Skip to main content

Cyber Crimes and Hackers

  • Chapter
Computer Network Security

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

5.6 References

  1. “Section A: The Nature and Definition of a Critical Infrastructure” http://www.nipc.gov/nipcfaq.html.

    Google Scholar 

  2. Joseph M. Kizza. Computer Network Security and Cyber Ethics. North Calorina. McFarland, 2001.

    Google Scholar 

  3. Karen Forchet. Computer Security Management. Boyd & Frasher Publishing, 1994.

    Google Scholar 

  4. Timeline of Hacking.

    Google Scholar 

  5. http://fyi.cnn.com/fyi/interactive/school.tools/timelines/1999/computer.hacking/frameset.exclude.html

    Google Scholar 

  6. Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. New York: ACM Press, 1990.

    Google Scholar 

  7. Louis J. Freeh. “FBI Congressional Report on Cybercrime”. http://www.fbi.gov/congress00/cyber021600.htm.

    Google Scholar 

  8. Steven Levy. Hackers: Heroes of the Computer Revolution, Penguin Books, 1984.

    Google Scholar 

  9. Security in Cyberspace: U.S. Senate Permanent Subcommittee on Investigations. June 5, 1996.

    Google Scholar 

  10. John Christensen. “Bracing for Guerilla Warfare in Cyberspace.” CNN Interactive, April 6, 1999.

    Google Scholar 

  11. Carnige-Mellon University. CERT Coordination Center. “CERT/CC Statistics 1998–1999”. http://www.cert.org/stats/certstats.html

    Google Scholar 

  12. David S. Alberts. “Information Warfare and Deterrence-Appendix D: Defensive War: Problem Formation and Solution Approach.” http://www.ndu.edu/inns/books/ind/appd.htm.

    Google Scholar 

  13. “Hacker Sittings and News: Computer Attacks Spreading (11/19/99)” http://www.infowav.com/hacker/99/hack-11/1999-b.shtml.

    Google Scholar 

  14. Marcus J. Tanum.” Network Forensics: Network Traffic Monitoring.” http://www.nfr.net/forum/publications/monitor.html

    Google Scholar 

  15. Intrusion Detection: FAQ, vl.33: What is Network-based Intrusion Detection?” http://www.sans.org/newlook/resources/IDFAQ/network-based.html

    Google Scholar 

  16. Steve Jackson. “ESM NetRecon: Ultrascan” http://www.si.com.au/Appendix/NetRecon%20Ultrascan%20technology.html

    Google Scholar 

  17. “Annual Cost of Computer Crime Rise Alarmingly” Computer Security Institute. http://www.gocsi.com/prela11.html.

    Google Scholar 

  18. Trigaux, R., “Hidden Dangers.”, St. Petersburg Times, June 16, 1998.

    Google Scholar 

  19. “Glossary of Vulnerability Testing Terminology”. http://www.ee.oulu.fi/research/ouspg/sage/glossary/

    Google Scholar 

  20. Joseph M. Kizza. Social and Ethical Issues in the Information Age. 2nd edition. New York: Springer, 2003.

    Google Scholar 

  21. “Anatomy of an attack” The Economist, February 19–25, 2000

    Google Scholar 

  22. “Cybercrime threat ‘real and growing'”. http://news.bbc.co.uk/2/hi/science/nature/978163.stm

    Google Scholar 

  23. Denning, Dorothy. ‘Activism, Hacktivism, and Cyberterrorisim: The Internet as a Tool or Influencing Foreign Policy”. http://www.nautilus.og/info-policy/workshop/papers/denning.html.

    Google Scholar 

  24. Lemos, Robert. “Online vandals smoke New York Times site”. CNET News.com. http://news.com.com/2009-1001-252754.html.

    Google Scholar 

  25. Shachtman, Noah. “Hacktivists Stage Virtual Sit-In at WEF Web site”. AlterNet. http://www.alternet.org/story.html?StoryID=12374.

    Google Scholar 

  26. Michelle Slatalla. “A brief History of Hacking” http://tlc.discovery.com/convergence/hackers/articles/history.html

    Google Scholar 

  27. “Phone Phreaking: The Telecommunications Underground” http://telephonetribute.com/phonephreaking.html.

    Google Scholar 

  28. Ron Rosenbaum. “Secrets of the Little Blue Box.” http://www.webcrunchers.com/crunch/esq-art.html.

    Google Scholar 

  29. “The Complete History of Hacking” http://www.wbglinks.net/pages/history/

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

(2005). Cyber Crimes and Hackers. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_5

Download citation

  • DOI: https://doi.org/10.1007/0-387-25228-2_5

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-20473-4

  • Online ISBN: 978-0-387-25228-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics