Fighting Computer Crime: A New Framework for Protecting Information

Author:   Donn B. Parker
Publisher:   John Wiley & Sons Inc
ISBN:  

9780471163787


Pages:   528
Publication Date:   24 September 1998
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $208.43 Quantity:  
Add to Cart

Share |

Fighting Computer Crime: A New Framework for Protecting Information


Add your own review!

Overview

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he reveals: * Who your greatest security threats really are (be prepared for some surprises!) * Why employees undergoing divorce can be your organization's greatest computer security risk * How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems. * Effective countermeasures for each threat covered in the book * How to neutralize even the most powerful cybercrime scheme attempts * Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized

Full Product Details

Author:   Donn B. Parker
Publisher:   John Wiley & Sons Inc
Imprint:   John Wiley & Sons Inc
Dimensions:   Width: 19.30cm , Height: 3.00cm , Length: 23.50cm
Weight:   0.905kg
ISBN:  

9780471163787


ISBN 10:   0471163783
Pages:   528
Publication Date:   24 September 1998
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

The Myth of Information Security. What Are We Protecting? The Rise of Cybercrime. Computer Abuse and Misuse. Network Abuse and Misuse. Cyberspace Abusers and Misusers. The Disastrous Hacker Culture. The Artisans of Information Security. The Current Foundation for Information Security. A New Framework for Information Security. Information Security Assessments. How to Conduct a Baseline Security Assessment. Good and Bad Control Objectives. Tactics for Effective Information Security. Strategies for Effective Information Security. Organizing for Security. Doing It Right and Preparing for the Next Millennium. Index.

Reviews

The author of Crime by Computer (1976) - and, subsequently, four other major works bearing on the subject - here provides a dossier on computer abuses chiefly designed, it appears, to allay fears of computerization by down-playing computer crime and downgrading computer diddling. The book is so murky and choppy, however, that few are likely to penetrate very far. To start with, we have an epigraph from IBM: The Computer didn't do it. Then Parker assures us that computer crime is relatively rare when compared with other crime. As computers proliferate, moreover, I anticipate that adequate security measures will be planned and implemented. (How he and his employer do this, we later hear.) In the leadoff case, a financial fraud perpetrated by a computer expert, computers were not essential to the crime. The news media called it a computer crime because most reporters don't know the difference (and they know the public responds). Then, 13 technical computer-crime methods are described (piggybacking, superzapping, wiretapping, etc.), along with safeguards against them. Various types of computer criminals are discussed, along with the need to reform them. (Students must learn that the computer is sacrosanct ; the common rationalization that the use of idle services is harmless must be exposed.) Other brief chapters take up the weaknesses of existing laws, the problems of Electronic Funds Transfer security, etc. Computer security itself is divided into five layers, six functions, and assorted safeguards. The book's real subject, in fact, is computer security; for public concerns - from individual privacy to national security - and for tales of computer crime, readers will have to look elsewhere (including Burnham, above, and Pool, below). (Kirkus Reviews)


Author Information

DONN B. PARKER has written numerous books and articles on computer crime. The world's most listened-to cybercrime expert, he has been featured in articles appearing in newspapers and magazines ranging from PC Magazine to People and has appeared on 60 Minutes, 20/20, and Nova.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List