-
1
-
-
85055781849
-
-
Danvers, MA, Auerbach Publications, doi:10.1201/9781420086942
-
Chisea, R., Ciappi, S., & Ducci, S. (2008). Profiling hackers: The science of criminal profiling as applied to the world of hacking. now Your Enemy. Danvers, MA: Auerbach Publications. doi:10.1201/9781420086942
-
(2008)
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. Now Your Enemy
-
-
Chisea, R.1
Ciappi, S.2
Ducci, S.3
-
2
-
-
70449592321
-
-
Retrieved December 22, 2009, from
-
Dibbell, J. (2008). Mutilated furries, flying phalluses: Put the blame on griefers, the sociopaths of the virtual world. Retrieved December 22, 2009, from http://www.wired.com/gaming/virtualworlds/magazine/16-02/mf_goons
-
(2008)
Mutilated Furries, Flying Phalluses: Put the Blame on Griefers, the Sociopaths of the Virtual World
-
-
Dibbell, J.1
-
3
-
-
0004181580
-
-
Glencoe, IL: Free Press. (Original work published 1893)
-
Durkheim, E. (1947). The division of labor in society. Glencoe, IL: Free Press. (Original work published 1893)
-
(1947)
The Division of Labor in Society
-
-
Durkheim, E.1
-
4
-
-
84899326242
-
Terrorist attack on the national electrical grid
-
In J. Garrick (Ed.), St, Louis, MO, Academic Press
-
Garrick., Stetkar, J., & Kilger, M. (2009). Terrorist attack on the national electrical grid. In J. Garrick (Ed.), Quantifying and controlling catastrophic risks (pp. 111-177). St. Louis, MO: Academic Press.
-
(2009)
Quantifying and Controlling Catastrophic Risks
, pp. 111-177
-
-
Garrick1
Stetkar, J.2
Kilger, M.3
-
5
-
-
34250765782
-
The rise and rise of keyloggers
-
doi:10.1016/S1353-4858(07)70052-1
-
Heron, S. (2007). The rise and rise of keyloggers. Network Security, 7, 4-6. doi:10.1016/S1353-4858(07)70052-1
-
(2007)
Network Security
, vol.7
, pp. 4-6
-
-
Heron, S.1
-
6
-
-
33847270657
-
Subcultural evolution? Examining the influence of on- and -off line experiences on deviant subcultures
-
doi:10.1080/01639620601131065
-
Holt, T. (2007). Subcultural evolution? Examining the influence of on- and -off line experiences on deviant subcultures. Deviant Behavior, 28(2), 171-198. doi:10.1080/01639620601131065
-
(2007)
Deviant Behavior
, vol.28
, Issue.2
, pp. 171-198
-
-
Holt, T.1
-
8
-
-
34848911641
-
Social phishing
-
doi:10.1145/1290958.1290968
-
Jagatic, T., Johnson, N., & Jakobsson, M. (2008). Social phishing. Communications of the ACM, 50(10), 94-100. doi:10.1145/1290958.1290968
-
(2008)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
-
11
-
-
84899324514
-
-
MIT IHTFP Hack Gallery, Retrieved from December 22, 2009, from
-
MIT IHTFP Hack Gallery. (1994). The hacker ethic. Retrieved from December 22, 2009, from http://hacks.mit.edu/misc/ethics.html
-
(1994)
The Hacker Ethic
-
-
-
12
-
-
84899355330
-
-
Multiple unknown authors, Retrieved December 22, 2009, from
-
Multiple unknown authors (1994). The Jargon File, version 3.1.0. Retrieved December 22, 2009, from http://jargon-file.org/archive/
-
(1994)
The Jargon File, Version 3.1.0
-
-
-
13
-
-
84883218995
-
-
Multiple unknown authors, Retrieved December 22, 2009, from
-
Multiple unknown authors (2003). The Jargon File, version 4.4.7. Retrieved December 22, 2009, from http://www.catb.org/~esr/jargon/html/index.html
-
(2003)
The Jargon File, Version 4.4.7
-
-
-
14
-
-
85080711655
-
USENIX workshop on hot topics in understanding botnets, april 2007
-
Provos, N. McNamee, D., Mavrommatis, P., Wang, K., & Modadugu, N. (2007). The ghost in the browser: Analysis of web-based malware. USENIX Workshop on Hot Topics in Understanding Botnets, April 2007.
-
(2007)
The Ghost in the Browser: Analysis of Web-based Malware
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
17
-
-
74549149057
-
-
Retrieved December 22, 2009, from
-
Shaw, E., Ruby, K., & Post, J. (1998). The insider threat to insider information systems. Retrieved December 22, 2009, from http://www.rand.org/pubs/conf_proceedings/CF163/CF163.appe.pdf
-
(1998)
The Insider Threat to Insider Information Systems
-
-
Shaw, E.1
Ruby, K.2
Post, J.3
-
19
-
-
39749170972
-
-
Retrieved December 22, 2009, from
-
Watson, D., Holz, T., & Mueller, S. (2005). Know your enemy: Phishing. Retrieved December 22, 2009, from http://www.honeynet.org/papers/phishing
-
(2005)
Know Your Enemy: Phishing
-
-
Watson, D.1
Holz, T.2
Mueller, S.3
|