It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.01.20150123.full.mrc:73204312:2489
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.01.20150123.full.mrc:73204312:2489?format=raw

LEADER: 02489cam a2200265uu 4500
001 001077298-7
005 20020606090541.3
008 830907s1983 nyua b 00110 eng
010 $a 83003217
020 $a068417796X
035 0 $aocm09282802
035 1 $aMAHL83B4508
040 $aDLC$cDLC
050 00 $aHV6773.C65$bP37 1983
100 1 $aParker, Donn B.
245 10 $aFighting computer crime /$cDonn B. Parker.
260 0 $aNew York :$bScribner,$cc1983.
300 $axiii, 352 p. :$bill. ;$c24 cm.
500 $aIncludes index.
504 $aBibliography: p. 339-342.
505 0 $apt. I. Computer abuse. An almost perfect crime ; Computer abuse research ; How much computer crime is there? -- pt. II. Computer crime methods. The problem of reporting computer vulnerabilities ; The benefits and dangers of describing criminal methods ; Sabotage ; Piggybacking and impersonation ; Data diddling ; Superzapping and scavenging ; Wiretapping ; Trapdoors, Trojan horses, and salamis ; Asynchronous attacks, logic bombs, and simulation -- pt. III. The new criminals. Computer criminals ; Amateurs, crazies, organizations, and foreign powers ; Career criminals ; Extreme advocates ; System hackers ; Revolt of the students ; The whiz kid ; The New York school gang ; Syscruncher and Vladimir ; The three terminaleers ; The misadventures of Cap'n Crunch ; Stopping the system hacker -- pt. IV. Ethical conflicts in computing. Fastest toes in the west ; The need for special ethics ; Conflict over obligations and implicit contracts ; Disputed rights to products ; Confidentiality of sensitive data ; Personal morality and organizational loyalty ; Responsibility for computer applications ; Responsibility owed to decision makers and the public -- pt. V. Computer crime in the law. Computer crime is crime ; Prosecutors, cops, and judges ; The law ; On charging computer crime -- pt. VI. Future vulnerabilities and risk reduction. The vulnerabilities of computerized society in Sweden ; Electronic funds transfer systems as a national vulnerability in the United States ; Vulnerability concerns and reactions throughout the world ; Risk reduction ; The functions of security ; Crypto, the premier safeguard ; Public key cryptosystems ; The ultimate secure computer network of the future.
650 0 $aComputer crimes$xPrevention.
776 08 $iOnline version:$aParker, Donn B.$tFighting computer crime.$dNew York : Scribner, ©1983$w(OCoLC)654533731
988 $a20020608
906 $0DLC