书籍 Cyber crime的封面

Cyber crimePDF电子书下载

R. K.

购买点数

16

出版社

Pentagon Press

出版时间

2002

ISBN

标注页数

532 页

PDF页数

542 页

标签

图书目录

1. Information Age and Cyber Crime 1

Cyber Space 1

Historical Roots of the Internet 6

Relationship between Computers Crime and Law 10

Information Age: The Third Wave 12

The Economy: Knowledge-based 16

From Information Super-highway to the Information Society 19

2. The Nature and Concept of Crime 23

Mental Elements of Crime 24

Brief Historical Perspective of Criminal Law 24

Classification of Crimes 27

Criminal Responsibility 28

Theories of Aetiology of Crime 29

Theories and Objectives of Punishment 32

The Organized Crime 35

The "White-Collar" Crime 36

Terrorism 37

Cyber Crime 38

3. Cyber Crime 41

Definition of "Computer Crime" 43

Computer Crime Categories: How Techno-Criminals Operate 46

Types of Computer Crimes 46

Another System of Classification of Computer Crime 50

Crime on Web 55

Special Problems Related with Computer-related Crime 59

Perspective on Legal Issues 62

Indian Scenario 63

4. Cyber Jurisdiction 68

Definition of Cyber Jurisdiction 68

The Model for Jurisdictional Analysis 69

Cyber Jurisdiction 72

The Indian Context of Cyber Jurisdiction 86

5. Cyber Crime and Criminal Codification in India 89

Ⅰ. Offences by or Relating to Public Servants 89

Ⅱ. Offences against the Public Tranquility 92

Ⅲ. Offences Relating to the Army, Navy and Air Force 95

Ⅳ. Offences against the State 96

Ⅴ. Offences Relating to Elections 98

Ⅵ. Contempt of Lawful Authority of Public Servant 101

Ⅶ. False Evidence and Offences against Public Justice 108

Ⅷ. Offences Relating to Coin and Government Stamps 120

Ⅸ. Offences Relating to Weights and Measures 120

Ⅹ. Offences Affecting the Public Health, Safety,Convenience, Decency and Morals 121

Ⅺ. Of Offences Relating to Religion 125

Ⅻ. Of Offences Affecting the Human Body 126

ⅩⅢ. Offences against Property 128

ⅩⅠⅤ. Offences Relating to Documents and to Property Marks 132

ⅩⅤ. Of the Criminal Breach of Contracts of Service 140

ⅩⅤⅠ. Of Defamation 140

ⅩⅤⅡ. Of Criminal Intimidation, Insult and Annoyance 145

ⅩⅤⅢ. Of Attempts to Commit Offences 148

6. Protection of Intellectual Property—Ⅰ(Patents, Trademarks and Databases) 155

Patents 157

Indian Patent Law 160

Trade Marks 168

Databases 189

7. Protection of Intellectual Property—Ⅱ (Copyrights) 219

Copyrights 220

8. Digital Signature 238

Working of Digital Signature Technology 244

9. Issues of Encryptation and Cryptography 252

Transition to Electronic Transactions 252

Security of Information Systems and Cryptography 255

Cryptography in India 260

Electronic Payments 263

Special Issues for Consideration with Cryptography Policy 266

International Co-operation 274

Government Activities Related to Cryptography Policy 275

Other Issues 280

10. Privacy Issues in the Information Age 282

Privacy and Surveillance 284

Privacy: Meaning 286

Legal Perspective and Framework 295

11. Kind and Pattern of Intrusions' Motive 317

Methods of Attack 321

Topology of Intruders 322

Global Differences 326

Future Issues 335

12. Communication Network as Surveillance Tool 340

The Web 340

Intelligence 342

Tool 342

Espionage 343

The Interlude 345

Data and Information Processing 347

The Operations 348

The Tradecraft 349

The Armament 351

Other Forms of Conflict/War 356

Agitation, Subversion, and Rioting 357

Propaganda, Psyops, Disinformation, DiversionaryDiplomacy 357

Economic Intelligence and Attacks 359

Web or Net Crimes 359

Information Warfare 360

Guerrilla Warfare and Terrorism 362

13. Hackers Psychology and Laws Related to Hacking 364

Genesis of the term Hacker 366

Theories of Delinquency (Hacker Behaviour) 368

New Taxonomy 371

Psychological Profiles 373

14. Identity and Information Theft 378

Identity Theft Case Files 384

Avoid Being an Easy Target 386

15. Cyber Fraud and Electronic Misuse 397

Definition of Computer Fraud or Cyber Fraud 398

Characteristics Cyber Fraud Offence 399

How Victims are Deceived? 401

How the Victims of Cyber Fraud are Deceived? 402

The Legal Issues 404

Fraud-related Offenses 404

16. Pornography and Obscenity on Web 416

Historical Roots 419

United Kingdom 419

United State of America 422

India 429

Internet and Pornography 433

17. Computer Viruses 459

Earliest History of Viral Programs 459

Early Viral Related Programs 461

Kinds of Viruses Programs 478

Working of Viruses 482

Mechanism of Infection of Virus 483

File Infectors 484

Disk Infectors 484

Methods of Distribution of Viruses 489

18. Cyberstalking 493

Malice 493

19. Protection of Cyber Crimes 500

Encryption in Crime and Terrorism 502

Law Enforcement Options 510

Other Technologies for Hiding Evidence 517

Concealing Crimes through Anonymity 520

Index 528

查看更多关于的内容

相关书籍
在线购买PDF电子书
下载此书RAR压缩包