繁体
首页

第61章 犯罪(10)(2 / 3)

[61] Dorothy E. Denning,Information Warfare and Security,ACM Press/Addison-Wesley,1999.

[62] Dorothy E. Denning and Peter J. Denning,eds.Internet Besieged:Countering Cyberspace Scofflaws,ACM Press/Addison-Wesley,1998. A collection of articles on hacking and Internet security.

[63] Pam Dixon,Medical Identity Theft:The Information Crime That Can Kill You,World Privacy Forum,May 3,2006,www.worldprivacyforum.org/medicalidentity theft.html.

[64] Scott Eltringham,"Prosecuting Computer Crimes,"U.S. Department of Justice,Feb. 2007,www.usdoj.gov/criminal/cybercrime/ccmanual/index.html.

[65] Jack Goldsmith and Tim Wu,Who Controls the Internet?Illusions of a Borderless World,Oxford University Press,2006. Argues in favor of each country strictly enforcing its laws against foreigners to control what enters its borders via the Internet. See Corn-Revere,"Caught in the Seamless Web,"above.

[66] Warren G. Kruse II and Jay G. Heiser,Computer Forensics:Incident Response,AddisonWesley,2001.

[67] Steven Levy,Hackers:Heroes of the Computer Revolution,Doubleday,1984.

[68] Mark Manion and Abby Goodrum,"Terrorism or Civil Disobedience:Toward a Hacktivist Ethic,"in Richard A. Spinello and Herman T. Tavani,eds,Readings in CyberEthics,Jones and Bartlett,2001,pp. 463–473. Argues for expanding the ethical justification for civil disobedience to include hacktivism.

[69] Kevin Mitnick,Ghost in the Wires:My Adventures as the World's Most Wanted Hacker,Little,Brown &;Co.2011.