Paper Details  
 
   

Has Bibliography
13 Pages
3167 Words

 
   
   
    Filter Topics  
 
     
   
 

The Growing Threat of Computer Crime

to the destruction of the race that created it. ReferencesAbreu, E.M. (1999, September). Experts find Microsoft Hotmail hack easier than claimed. Company Business and Marketing.Bernardo, R. (May 4, 2001). State law moves to address technology crime. Honolulu Star-BulletinCisco Secure IDS (2001). [On-line]. Available: http://www.cisco.comEaton, J.W. (1986). Card-carrying Americans. Privacy;, Security, and the national i.d card debate. United States of America: Rowman & Littlefield.Farrow, R. & Power, R. (2001). Five vendors some no-nonsense questions on IDS. CSI Intrusion System Resource Goodwin, B. (2000, August ). Safeway site is still down after hack attack.. Company Business and Marketing.Network ICE Corporation (1998-2000). Password theft [On-line]. Available: http://www.netice.comNiccolai, J. (02/11/2000). Analyst puts recent hacker damage at $1.2 billion and rising [On-line]. Available: http://www.nwfusion.comn/newsReal Secure (2001). [On-line]. Available: http://www.securehq.comSchindler, D.J. (2000, March). E-Crime and what to do about it. Los Angeles Business Journal.SilentRunnerTM. SilentRunnerTM [On-line]. Available: http://www.silentrunner.com/about/index.html.Teach, E. (1998, February). Look who's hacking now. CFO, The Magazine for Senior Financial Executives....

< Prev Page 11 of 13 Next >

    More on The Growing Threat of Computer Crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA