| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


CYBERCRIME AND CYBERTERRORISM: READINGS AND LINKS

MCGRATH, Mike

2014. Java in Easy Steps: Covers Java 8. Fifth Edition. Leamington Spa, Warwickshire, UK: In Easy Steps Limited. ISBN-13 9781840786217 (paperback).

2010. Linux in Easy Steps. Fifth Edition. Leamington Spa, Warwickshire, UK: In Easy Steps Limited. ISBN-13 9781840783964 (paperback).

2012. SQL in Easy Steps. Third Edition. Leamington Spa, Warwickshire, UK: In Easy Steps Limited. ISBN-13 9781840785432 (paperback).

2014. UNIX in Easy Steps. Leamington Spa, Warwickshire, UK: In Easy Steps Limited. ISBN-13 9781840786224 (paperback).

MCQUADE, Samuel C., III

2005. Understanding and Managing Cybercrime. Technology and Criminal Justice. Upper Saddle River, NJ: Pearson Education, Inc./Prentice Hall. ISBN-13 9780205439737 (paperback).

MEYERS, Mike, Travis A. EVERETT, and Scott JERNIGAN

2016. Mike Meyers' CompTIA A+ Certification Passport (Exams 220-901 & 220-902). Sixth Edition. Mike Meyers' Certification Passport. New York, NY: The McGraw-Hill Companies. ISBN-13 9781259589607 (paperback).

MEYERS, Mike, Jonathan S. WEISSMAN, and Scott JERNIGAN

2016. Mike Meyers' CompTIA Network+ Certification Passport (Exam N10-006). Fifth Edition. Mike Meyers' Certification Passport. New York, NY: The McGraw-Hill Companies. ISBN-13 9780071847964 (paperback).

NEGUS, Christopher

2015. Linux Bible. Ninth Edition. Indianapolis, IN: John Wiley & Sons, Inc. ISBN-13 9781118999875 (paperback).

RICE, David

2007. Geekonomics: The Real Cost of Insecure Software. Boston, MA: Addison-Wesley Professional/Pearson Education, Inc. ISBN-13 9780321735973 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Computer Forensics

AKHGAR, Babak, Andrew STANIFORTH, and Francesca BOSCO, Editors.

2014. Cyber Crime and Cyber Terrorism Investigator's Handbook. Waltham, MA: Syngress/Elsevier, Inc. ISBN-13 9780128007433 (paperback).

ALTHEIDE, Cory, and Harlan CARVEY

2011. Digital Forensics with Open Source Tools. Waltham, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495868 (paperback).

JAQUITH, Andrew

2007. Security Metrics: Replacing Fear, Uncertainty, and Doubt. Upper Saddle River, NJ: Addison-Wesley Professional/Pearson Education, Inc. ISBN-13 9780321349989 (paperback).

REYES, Anthony

2007. Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors. Rockland, MA: Syngress Publishing, Inc./Elsevier, Inc. ISBN-13 9781597491334 (paperback).

STOLL, Cliff

2005. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. New York, NY: Gallery Books/Simon & Schuster, Inc. ISBN-13 9781416507789 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Computer Security

CAPPELLI, Dawn M., Andrew P. MOORE, and Randall F. TRZECIAK

2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Software Engineering Institute (SEI) Series in Software Engineering. SEI/Carnegie Mellon University. Upper Saddle River, NJ: Addison-Wesley Professional/Pearson Education, Inc. ISBN-13 9780321812575 (hardcover).

CIAMPA, Mark

2011. Security+ Guide to Network Security Fundamentals. Fourth Edition. Boston, MA: Course Technology/Cengage Learning. ISBN-13 9781111640125 (paperback).

MEYERS, Mike, Dawn DUNKERLEY, and T.J. SAMUELLE

2016. Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-401). Fourth Edition. Mike Meyers' Certification Passport. New York, NY: The McGraw-Hill Companies. ISBN-13 9780071832144 (paperback).

SAADAWI, Tarek, and John D. COLWELL, Jr.(LTC US Army, Ret.)

2017. Cyber Infrastructure Protection: Volume III [GPO Stock Number 008-000-01267-9]. Carlisle, PA: Strategic Studies Institute (SSI), Army Training and Doctrine Command (TRADOC), US Department of the Army, US Department of Defense (DoD). ISBN-13 9781584877530 (paperback). [This document is available as a free PDF at http://ssi.armywarcollege.edu/pubs/display.cfm?pubID=1350.]

SAADAWI, Tarek, Louis H. JORDAN, Jr., and Vincent BOUDREAU

2013. Cyber Infrastructure Protection: Volume II [GPO Stock Number ]. Carlisle, PA: Strategic Studies Institute (SSI), Army Training and Doctrine Command (TRADOC), US Department of the Army, US Department of Defense (DoD). ISBN-13 9781584875712 (paperback). [This document is available as a free PDF at https://hsdl.org/?view&did=736037.]

WHITMAN, Michael E., and Herbert J. MATTORD

2011. Principles of Information Security. Fourth Edition. Boston, MA: Course Technology/Cengage Learning. ISBN-13 9781111138219 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Cyberterrorism

DUNNIGAN, James F.

2003. The Next War Zone: Confronting the Global Threat of Cyberterrorism. New York, NY: Kensington Publishing Corporation. ISBN-13 9780806524146 (paperback).

TAYLOR, Robert W., Eric J. FRITSCH, John R. LIEDERBACH, and Thomas J. HOLT

2011. Digital Crime and Digital Terrorism. Second Edition. Pearson Criminal Justice. Upper Saddle River, NJ: Pearson Education, Inc./Prentice Hall. ISBN-13 9780137008773 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Hacking & Cracking

ANDERSON, Brian, and Barbara ANDERSON

2010. Seven Deadliest USB Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495530 (paperback).

HAINES, Brad

2010. Seven Deadliest Wireless Technologies Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495417 (paperback).

PAULI, Josh

2013. The Basics of Web Hacking: Tools and Techniques to Attack the Web. Waltham, MA: Syngress/Elsevier, Inc. ISBN-13 9780124166004 (paperback).

PROWELL, Stacy, Rob KRAUS, and Mike BORKIN

2010. Seven Deadliest Network Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495493 (paperback).

REGALADO, Daniel, Shon HARRIS, Allen HARPER, et.al.

2015. Gray Hat Hacking The Ethical Hacker's Handbook. Fourth Edition. Columbus, OH: McGraw-Hill Education. ISBN-13 9780071832380 (paperback).

SHEMA, Mike

2010. Seven Deadliest Web Application Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495431 (paperback).

SPITZNER, Lance

2002. Honeypots: Tracking Hackers. Boston, MA: Addison-Wesley Professional/Pearson Education, Inc. ISBN-13 9780321108951 (paperback).

STREET, Jayson E., and Kent NABORS

2010. Dissecting the Hack: The F0rb1dd3n Network. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597494786 (paperback).

TIMM, Carl, and Richard PEREZ

2010. Seven Deadliest Social Network Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495455 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Identity Theft / Online Fraud & Theft

HADNAGY, Christopher

2011. Social Engineering: THe Art of Human Hacking. Indianapolis, IN: Wiley Publishing, Inc. ISBN-13 9780470639535 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Cyber/Information Warfare

ANDRESS, Jason, and Steve WINTERFELD

2011. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Waltham, MA: Syngress/Elsevier, Inc. ISBN-13 9781597496377 (paperback).

BRENNER, Joel

2013. Glass Houses: Privacy, Secrecy, and Cyber Security in a Transparent World. (Originally published as America the Vulnerable in 2011.) New York, NY: Penguin Books/Penguin Group (USA) Inc. ISBN-13 9780143122111 (paperback).

CLARKE, Richard A., and Robert K. KNAKE

2012. Cyber War: The Next Threat to National Security and What to Do About It. New York, NY: ECCO/HarperCollins Publishers, Inc. ISBN-13 9780061962240 (paperback).

GERTZ, Bill

2017. iWar: War and Peace in the Information Age. New York, NY: Threshold Editions/Simon & Schuster, Inc. ISBN-13 9781501154980 (paperback).

KRAMER, Franklin D., Stuart H. STARR, and Larry WENTZ, Editors

2009. Cyberpower and National Security. Center for Technology and National Security Policy, National Defense University (NDU). Dulles, VA: Potomac Books, Inc. (formerly Brassey's, Inc.) ISBN-13 9781597974233 (paperback).

SINGER, P.W., and Allan FRIEDMAN

2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York, NY: Oxford University Press. ISBN-13 9780199918119 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Intellectual Property & Piracy

ANAWALT, Howard

2011. Idea Rights: A Guide to Intellectual Property. Durham, NC: Carolina Academic Press. ISBN-13 9781594603136 (paperback).

BENTLY, Lionel, and Brad SHERMAN

2008. Intellectual Property Law. Third Edition. Oxford, UK: Oxford University Press. ISBN-13 9780199292042 (paperback).

CHAUDHRY, Peggy, and Alan ZIMMERMAN

2010. The Economics of Counterfeit Trade: Governments, Consumers, Pirates and Intellectual Property Rights. Berlin, DE: Springer-Verlag. ISBN-13 9783642096631 (paperback).

JOHNS, Adrian

2011. Piracy: The Intellectual Property Wars from Gutenberg to Gates. Reprint Edition. Chicago, IL: University of Chicago Press. ISBN-13 9780226401195 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Privacy & Surveillance

BAMFORD, James

2002. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. New York, NY: Anchor Books/Random House, Inc. ISBN-13 9780385499088 (paperback).

2005. A Pretext for War: 9/11, Iraq, and the Abuse of America's Intelligence Agencies. New York, NY: Anchor Books/Random House, Inc. ISBN-13 9781400030347 (paperback).

1983. The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization. New York, NY: Penguin Books. ISBN-10 0140067485 (paperback).

2009. The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. New York, NY: Anchor Books/Random House, Inc. ISBN-13 9780307279392 (paperback).

BRZEZINSKI, Matthew

2004. Fortress America: On the Front Lines of Homeland Security—An Inside Look at the Coming Surveillance State. New York, NY: Bantam Dell/Random House, Inc. ISBN-13 9780553803662 (paperback).

DIFFIE, Whitfield, and Susan LANDAU

2010. Privacy on the Line: The Politics of Wiretapping and Encryption. Updated and Expanded Edition. Cambridge, MA: The MIT Press. ISBN-13 9780262514002 (paperback).

KEEFE, Patrick Radden

2006. Chatter: Uncovering the Echelon Surveillance Network and the Secret World of Global Eavesdropping. New York, NY: Random House Trade Paperbacks/Random House, Inc. ISBN-13 9780812968279 (paperback).

LONG, Duncan

2007. Protect Your Privacy: How to Protect Your Identity as well as Your Financial, Personal, and Computer Records in an Age of Constant Surveillance. Guilford, CT: The Lyons Press/The Globe Pequot Press. ISBN-13 9781599210209 (paperback).

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


Cognitive Science

KURZWEIL, Ray

2012. How to Create a Mind: The Secret of Human Thought Revealed. New York, NY: Viking/Penguin Group (USA) Inc. ISBN-13 9780670025299 (hardcover).

THAGARD, Paul

2012. "Cognitive Science." The Stanford Encyclopedia of Philosophy (SEP). Fall 2014 Edition. Edited by Edward N. Zalta. 11 July 2014. [Available online as a Web page at http://plato.stanford.edu/archives/fall2014/entries/cognitive-science.]

Web Sites


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


ACRONYMS


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


DEFINITIONS & DESCRIPTIONS


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |


SEARCH ENGINES


| Top | | General | | C-Forensics | | C-Security | | C-Terrorism | | Hacking & Cracking | | Identity Theft / Online Fraud & Theft | | Cyber/Information Warfare | | Intellectual Property & Piracy | | Privacy & Surveillance | | Cognitive Science | | Acronym | | Definition | | Search |