| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
CYBERCRIME AND CYBERTERRORISM: READINGS AND LINKS
- MCGRATH, Mike
- 2014. Java in Easy Steps: Covers Java 8. Fifth Edition. Leamington Spa, Warwickshire, UK: In Easy Steps Limited. ISBN-13 9781840786217 (paperback).
- 2010. Linux in Easy Steps. Fifth Edition. Leamington Spa, Warwickshire, UK: In Easy Steps Limited. ISBN-13 9781840783964 (paperback).
- 2012. SQL in Easy Steps. Third Edition. Leamington Spa, Warwickshire, UK: In Easy Steps Limited. ISBN-13 9781840785432 (paperback).
- 2014. UNIX in Easy Steps. Leamington Spa, Warwickshire, UK: In Easy Steps Limited. ISBN-13 9781840786224 (paperback).
- MCQUADE, Samuel C., III
- 2005. Understanding and Managing Cybercrime. Technology and Criminal Justice. Upper Saddle River, NJ: Pearson Education, Inc./Prentice Hall. ISBN-13 9780205439737 (paperback).
- MEYERS, Mike, Travis A. EVERETT, and Scott JERNIGAN
- 2016. Mike Meyers' CompTIA A+ Certification Passport (Exams 220-901 & 220-902). Sixth Edition. Mike Meyers' Certification Passport. New York, NY: The McGraw-Hill Companies. ISBN-13 9781259589607 (paperback).
- MEYERS, Mike, Jonathan S. WEISSMAN, and Scott JERNIGAN
- 2016. Mike Meyers' CompTIA Network+ Certification Passport (Exam N10-006). Fifth Edition. Mike Meyers' Certification Passport. New York, NY: The McGraw-Hill Companies. ISBN-13 9780071847964 (paperback).
- NEGUS, Christopher
- 2015. Linux Bible. Ninth Edition. Indianapolis, IN: John Wiley & Sons, Inc. ISBN-13 9781118999875 (paperback).
- RICE, David
- 2007. Geekonomics: The Real Cost of Insecure Software. Boston, MA: Addison-Wesley Professional/Pearson Education, Inc. ISBN-13 9780321735973 (paperback).
Web Sites
- McAfee: An Intel Company. McAfee, Inc. Updated daily.
- Symantec: Confidence in a connected world. Symantec Corporation. Updated daily.
- US Computer Emergency Readiness Team (US-CERT). National Cyber Security Division (NCSD), US Department of Homeland Security (DHS). Updated often.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
- AKHGAR, Babak, Andrew STANIFORTH, and Francesca BOSCO, Editors.
- 2014. Cyber Crime and Cyber Terrorism Investigator's Handbook. Waltham, MA: Syngress/Elsevier, Inc. ISBN-13 9780128007433 (paperback).
- ALTHEIDE, Cory, and Harlan CARVEY
- 2011. Digital Forensics with Open Source Tools. Waltham, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495868 (paperback).
- JAQUITH, Andrew
- 2007. Security Metrics: Replacing Fear, Uncertainty, and Doubt. Upper Saddle River, NJ: Addison-Wesley Professional/Pearson Education, Inc. ISBN-13 9780321349989 (paperback).
- REYES, Anthony
- 2007. Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors. Rockland, MA: Syngress Publishing, Inc./Elsevier, Inc. ISBN-13 9781597491334 (paperback).
- STOLL, Cliff
- 2005. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. New York, NY: Gallery Books/Simon & Schuster, Inc. ISBN-13 9781416507789 (paperback).
Web Sites
- Computer Forensics World. Computer Forensics World. Updated daily.
- What Is Computer Forensics? (Steve Hailey). Cybersecurity Institute (CSI). SP Hailey Enterprises. 19 September 2003.
- IACIS: The International Association of Computer Investigative Specialists. IACIS. No date.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
- CAPPELLI, Dawn M., Andrew P. MOORE, and Randall F. TRZECIAK
- 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Software Engineering Institute (SEI) Series in Software Engineering. SEI/Carnegie Mellon University. Upper Saddle River, NJ: Addison-Wesley Professional/Pearson Education, Inc. ISBN-13 9780321812575 (hardcover).
- CIAMPA, Mark
- 2011. Security+ Guide to Network Security Fundamentals. Fourth Edition. Boston, MA: Course Technology/Cengage Learning. ISBN-13 9781111640125 (paperback).
- MEYERS, Mike, Dawn DUNKERLEY, and T.J. SAMUELLE
- 2016. Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-401). Fourth Edition. Mike Meyers' Certification Passport. New York, NY: The McGraw-Hill Companies. ISBN-13 9780071832144 (paperback).
- SAADAWI, Tarek, and John D. COLWELL, Jr.(LTC US Army, Ret.)
- 2017. Cyber Infrastructure Protection: Volume III [GPO Stock Number 008-000-01267-9]. Carlisle, PA: Strategic Studies Institute (SSI), Army Training and Doctrine Command (TRADOC), US Department of the Army, US Department of Defense (DoD). ISBN-13 9781584877530 (paperback). [This document is available as a free PDF at http://ssi.armywarcollege.edu/pubs/display.cfm?pubID=1350.]
- SAADAWI, Tarek, Louis H. JORDAN, Jr., and Vincent BOUDREAU
- 2013. Cyber Infrastructure Protection: Volume II [GPO Stock Number ]. Carlisle, PA: Strategic Studies Institute (SSI), Army Training and Doctrine Command (TRADOC), US Department of the Army, US Department of Defense (DoD). ISBN-13 9781584875712 (paperback). [This document is available as a free PDF at https://hsdl.org/?view&did=736037.]
- WHITMAN, Michael E., and Herbert J. MATTORD
- 2011. Principles of Information Security. Fourth Edition. Boston, MA: Course Technology/Cengage Learning. ISBN-13 9781111138219 (paperback).
Web Sites
- Computer Security Division Computer Security Resource Center. Information Technology Laboratory, US National Institute of Standards and Technology (NIST). Updated often.
- Cyber Securty Tips. US Computer Emergency Readiness Team (US-CERT). National Cyber Security Division (NCSD), US Department of Homeland Security (DHS). Updated frequently.
- Insider Threat Center, CERT Division, SEI/Carnegie Mellon University, 2016.
- Microsoft Safety & Security Center: Computer Security, Digital Privacy, and Online Safety. Microsoft Corporation. Updated frequently.
- Verizon RISK Team. 2014 Data Breach Investigations Report (DBIR). Verizon. 2014. The 2014 DBIR can be downloaded as a PDF, but the page also contains other information of interest, including links to older reports.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
- DUNNIGAN, James F.
- 2003. The Next War Zone: Confronting the Global Threat of Cyberterrorism. New York, NY: Kensington Publishing Corporation. ISBN-13 9780806524146 (paperback).
- TAYLOR, Robert W., Eric J. FRITSCH, John R. LIEDERBACH, and Thomas J. HOLT
- 2011. Digital Crime and Digital Terrorism. Second Edition. Pearson Criminal Justice. Upper Saddle River, NJ: Pearson Education, Inc./Prentice Hall. ISBN-13 9780137008773 (paperback).
Web Sites
- Criminal Justice Institute (CJI). University of Arkansas System. No date.
- Cyberterrorism Defense Initiative (CDI). Criminal Justice Institute (CJI), University of Arkansas System, with Training and Education Division, Federal Emergency Management Agency (FEMA), US Department of Homeland Security (DHS). No date.
- Homeland Security | Cyberterrorism. Center for Security Policy. 2015.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
- ANDERSON, Brian, and Barbara ANDERSON
- 2010. Seven Deadliest USB Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495530 (paperback).
- HAINES, Brad
- 2010. Seven Deadliest Wireless Technologies Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495417 (paperback).
- PAULI, Josh
- 2013. The Basics of Web Hacking: Tools and Techniques to Attack the Web. Waltham, MA: Syngress/Elsevier, Inc. ISBN-13 9780124166004 (paperback).
- PROWELL, Stacy, Rob KRAUS, and Mike BORKIN
- 2010. Seven Deadliest Network Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495493 (paperback).
- REGALADO, Daniel, Shon HARRIS, Allen HARPER, et.al.
- 2015. Gray Hat Hacking The Ethical Hacker's Handbook. Fourth Edition. Columbus, OH: McGraw-Hill Education. ISBN-13 9780071832380 (paperback).
- SHEMA, Mike
- 2010. Seven Deadliest Web Application Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495431 (paperback).
- SPITZNER, Lance
- 2002. Honeypots: Tracking Hackers. Boston, MA: Addison-Wesley Professional/Pearson Education, Inc. ISBN-13 9780321108951 (paperback).
- STREET, Jayson E., and Kent NABORS
- 2010. Dissecting the Hack: The F0rb1dd3n Network. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597494786 (paperback).
- TIMM, Carl, and Richard PEREZ
- 2010. Seven Deadliest Social Network Attacks. The Seven Deadliest Attacks Series. Burlington, MA: Syngress/Elsevier, Inc. ISBN-13 9781597495455 (paperback).
Web Sites
- Hack This Site!. Hack This Site!. Updated often.
- ScienceDaily: Hacking News. ScienceDaily LLC (Reuters). Updated daily.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
Identity Theft / Online Fraud & Theft
- HADNAGY, Christopher
- 2011. Social Engineering: THe Art of Human Hacking. Indianapolis, IN: Wiley Publishing, Inc. ISBN-13 9780470639535 (paperback).
Web Sites
- Fighting Back Against Identity Theft: Federal trade Commission. Federal trade Commission (FTC). No date.
- Identity Theft and Identity Fraud. US Department of Justice (DoJ). No date.
- itrc: Identity Theft Resource Center: Working to Resolve Dentity Theft. Identity Theft Resource Center (ITRC). No date.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
- ANDRESS, Jason, and Steve WINTERFELD
- 2011. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Waltham, MA: Syngress/Elsevier, Inc. ISBN-13 9781597496377 (paperback).
- BRENNER, Joel
- 2013. Glass Houses: Privacy, Secrecy, and Cyber Security in a Transparent World. (Originally published as America the Vulnerable in 2011.) New York, NY: Penguin Books/Penguin Group (USA) Inc. ISBN-13 9780143122111 (paperback).
- CLARKE, Richard A., and Robert K. KNAKE
- 2012. Cyber War: The Next Threat to National Security and What to Do About It. New York, NY: ECCO/HarperCollins Publishers, Inc. ISBN-13 9780061962240 (paperback).
- GERTZ, Bill
- 2017. iWar: War and Peace in the Information Age. New York, NY: Threshold Editions/Simon & Schuster, Inc. ISBN-13 9781501154980 (paperback).
- KRAMER, Franklin D., Stuart H. STARR, and Larry WENTZ, Editors
- 2009. Cyberpower and National Security. Center for Technology and National Security Policy, National Defense University (NDU). Dulles, VA: Potomac Books, Inc. (formerly Brassey's, Inc.) ISBN-13 9781597974233 (paperback).
- SINGER, P.W., and Allan FRIEDMAN
- 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York, NY: Oxford University Press. ISBN-13 9780199918119 (paperback).
Web Sites
- IWS: The Information Warfare Site. IWS. 21 February 2011.
- Information Warfare and Information Security on the Web. Intelligence Resource Program, Federation of American Scientists (FAS). 2 July 2003.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
Intellectual Property & Piracy
- ANAWALT, Howard
- 2011. Idea Rights: A Guide to Intellectual Property. Durham, NC: Carolina Academic Press. ISBN-13 9781594603136 (paperback).
- BENTLY, Lionel, and Brad SHERMAN
- 2008. Intellectual Property Law. Third Edition. Oxford, UK: Oxford University Press. ISBN-13 9780199292042 (paperback).
- CHAUDHRY, Peggy, and Alan ZIMMERMAN
- 2010. The Economics of Counterfeit Trade: Governments, Consumers, Pirates and Intellectual Property Rights. Berlin, DE: Springer-Verlag. ISBN-13 9783642096631 (paperback).
- JOHNS, Adrian
- 2011. Piracy: The Intellectual Property Wars from Gutenberg to Gates. Reprint Edition. Chicago, IL: University of Chicago Press. ISBN-13 9780226401195 (paperback).
Web Sites
- Computer Crime & Intellectual Property Section (CCIPS). CCIPS, Criminal Division, US Department of Justice (DOJ). No date.
- Department of Homeland Security Intellectual Property Policy. Office of the General Counsel, US Department of Homeland Security (DHS). 17 August 2011.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
- BAMFORD, James
- 2002. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. New York, NY: Anchor Books/Random House, Inc. ISBN-13 9780385499088 (paperback).
- 2005. A Pretext for War: 9/11, Iraq, and the Abuse of America's Intelligence Agencies. New York, NY: Anchor Books/Random House, Inc. ISBN-13 9781400030347 (paperback).
- 1983. The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization. New York, NY: Penguin Books. ISBN-10 0140067485 (paperback).
- 2009. The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. New York, NY: Anchor Books/Random House, Inc. ISBN-13 9780307279392 (paperback).
- BRZEZINSKI, Matthew
- 2004. Fortress America: On the Front Lines of Homeland Security—An Inside Look at the Coming Surveillance State. New York, NY: Bantam Dell/Random House, Inc. ISBN-13 9780553803662 (paperback).
- DIFFIE, Whitfield, and Susan LANDAU
- 2010. Privacy on the Line: The Politics of Wiretapping and Encryption. Updated and Expanded Edition. Cambridge, MA: The MIT Press. ISBN-13 9780262514002 (paperback).
- KEEFE, Patrick Radden
- 2006. Chatter: Uncovering the Echelon Surveillance Network and the Secret World of Global Eavesdropping. New York, NY: Random House Trade Paperbacks/Random House, Inc. ISBN-13 9780812968279 (paperback).
- LONG, Duncan
- 2007. Protect Your Privacy: How to Protect Your Identity as well as Your Financial, Personal, and Computer Records in an Age of Constant Surveillance. Guilford, CT: The Lyons Press/The Globe Pequot Press. ISBN-13 9781599210209 (paperback).
Web Sites
- epic.org: Electronic Privacy Information Center. Electronic Privacy Information Center (EPIC). Updated daily.
- National Security Agency (NSA)/Central Security Service (CSS). NSA/CSS. 19 December 2014.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
- KURZWEIL, Ray
- 2012. How to Create a Mind: The Secret of Human Thought Revealed. New York, NY: Viking/Penguin Group (USA) Inc. ISBN-13 9780670025299 (hardcover).
- THAGARD, Paul
- 2012. "Cognitive Science." The Stanford Encyclopedia of Philosophy (SEP). Fall 2014 Edition. Edited by Edward N. Zalta. 11 July 2014. [Available online as a Web page at http://plato.stanford.edu/archives/fall2014/entries/cognitive-science.]
Web Sites
- Cognitive Science Society. 20 February 2015.
- Indiana Philosophy Ontology (InPhO) Project. Cognitive Science Program, Indiana University Bloomington. 2013.
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |
| Top |
| General |
| C-Forensics |
| C-Security |
| C-Terrorism |
| Hacking & Cracking |
| Identity Theft / Online Fraud & Theft |
| Cyber/Information Warfare |
| Intellectual Property & Piracy |
| Privacy & Surveillance |
| Cognitive Science |
| Acronym |
| Definition |
| Search |