-
1
-
-
21344433201
-
The Changing Defi nition and Image of Hackers in PopularDiscourse
-
Academic, Press
-
Amanda Chandler, The Changing Defi nition and Image of Hackers in Popular Discourse, in International Journal of the Sociology of Law, Academic Press, 1996.
-
(1996)
International Journal of the Sociology of Law
-
-
Chandler, A.1
-
4
-
-
85055778361
-
-
Apogeo, Milano
-
Raoul Chiesa, Vola Condor, Vola, Apogeo, Milano, 1999, http://www.apogeonline.com/libri/88-503-1056-0/ebook/libro.
-
(1999)
Vola Condor, Vola
-
-
Chiesa, R.1
-
7
-
-
85055811041
-
Individual Characteristics for the Success in Computer Programming
-
Roy D. Dutta, Individual Characteristics for the Success in Computer Programming, in Journal of Personality and Clinical Studies, 19, 1, 2003.
-
(2003)
Journal of Personality and Clinical Studies
, vol.19
, Issue.1
-
-
Dutta, R.D.1
-
10
-
-
0042855099
-
-
The Editorial Board of The Sociological Review
-
Tim Jordan and Paul Taylor, A Sociology of Hackers, The Editorial Board of The Sociological Review, 1998, http://www.dvara.net/HK/1244356.pdf.
-
(1998)
A Sociology of Hackers
-
-
Jordan, T.1
Taylor, P.2
-
14
-
-
85055843679
-
-
Syngress Publishing, Rockland, MA
-
Johnny Long, Tim Mullen, Ryan Russell, Stealing the Network—How to Own Shadow, Syngress Publishing, Rockland, MA, 2007.
-
(2007)
Stealing the Network—How to Own Shadow
-
-
Long, J.1
Mullen, T.2
Russell, R.3
-
15
-
-
85055825319
-
-
Syngress Publishing, Rockland, MA
-
Johnny Long, Tim Mullen, Ryan Russell, Stealing the Network—How to Own an Identity, Syngress Publishing, Rockland, MA, 2005.
-
(2005)
Stealing the Network—How to Ownan Identity
-
-
Long, J.1
Mullen, T.2
Russell, R.3
-
16
-
-
85164849174
-
-
Syngress Publishing, Rockland, MA
-
Johnny Long, Tim Mullen, Ryan Russell, Stealing the Network—How to Own a Continent, Syngress Publishing, Rockland, MA, 2004.
-
(2004)
Stealing the Network—How to Owna Continent
-
-
Long, J.1
Mullen, T.2
Russell, R.3
-
17
-
-
84903854882
-
-
Syngress Publishing, Rockland, MA
-
Johnny Long, Tim Mullen, Ryan Russell, Stealing the Network—How to Own the Box, Syngress Publishing, Rockland, MA, 2003.
-
(2003)
Stealing the Network—How to Ownthe Box
-
-
Long, J.1
Mullen, T.2
Russell, R.3
-
20
-
-
85055778223
-
-
Inc., Indianapolis, IN
-
Kevin D. Mitnick and William L. Simon, The Art of Intrusion, Wiley Publishing, Inc., Indianapolis, IN, 2005.
-
(2005)
The Art of Intrusion, Wiley Publishing
-
-
Mitnick, K.D.1
Simon, W.L.2
-
21
-
-
2342548557
-
-
Inc., Indianapolis, IN
-
Kevin D. Mitnick, William L. Simon, The Art of Deception, Wiley Publishing, Inc., Indianapolis, IN, 2002.
-
(2002)
The Art of Deception, Wiley Publishing
-
-
Mitnick, K.D.1
Simon, W.L.2
-
22
-
-
35148880929
-
-
Understanding theJustification for Criminal Computer Activity
-
Marc Rogers, Modern-Day Robin Hood or Moral Disengagement. Understanding the Justification for Criminal Computer Activity, 1999, http://www.infowar.com.
-
(1999)
Modern-Day Robin Hood Or Moral Disengagement
-
-
Rogers, M.1
-
23
-
-
85055793680
-
-
Marc Rogers, The Psychology of Hackers: The Need for a New Taxonomy, 1999, http://www.infowar.com.
-
(1999)
-
-
Rogers, M.1
-
27
-
-
85055785170
-
-
Taylor & Francis, Boca Raton, FL
-
Paul Taylor, Hackers—Cyberpunks or Microserfs?, in Information, Communication and Society, Taylor & Francis, Boca Raton, FL, 1999.
-
(1999)
Hackers—Cyberpunks Or Microserfs?, in Information, Communicationand Society
-
-
Taylor, P.1
-
30
-
-
0037967312
-
Smyslova, Flow-Based Model of ComputerHackers’ Motivation
-
Alexander E. Voiskounsky, Olga V. Smyslova, Flow-Based Model of Computer Hackers’ Motivation, in Cyber-Psychology & Behavior, 6, 2003.
-
(2003)
Cyber-Psychology & Behavior
, pp. 6
-
-
Voiskounsky, A.E.1
Olga, V.2
-
31
-
-
0011893752
-
-
O’Reilly Media, Inc., California, March 1
-
Sam Williams, Free as in Freedom, O’Reilly Media, Inc., California, March 1, 2002.
-
(2002)
Free as in Freedom
-
-
Williams, S.1
-
33
-
-
33847638755
-
-
No Starch Press, California, April
-
Michal Zalewski, Silence on the Wire, No Starch Press, California, April 15, 2005.
-
(2005)
Silence on the Wire
-
-
Zalewski, M.1
-
35
-
-
85055829529
-
Così Attaccano gli Ingegneri Sociali
-
Edizioni Tecniche, Nuove, April
-
Raoul Chiesa, “Così Attaccano gli Ingegneri Sociali” in Internet News, Edizioni Tecniche, Nuove, April 2003.
-
Internet News
, pp. 2003
-
-
Chiesa, R.1
-
37
-
-
85055776065
-
Le 10 Regole dellHacking”
-
Raoul Chiesa, “Le 10 Regole dell’Hacking” in Internos, 1999.
-
(1999)
Internos
-
-
Chiesa, R.1
-
38
-
-
85055789053
-
Who is Who: Hackers, chi sono
-
Raoul Chiesa, “Who is Who: Hackers, chi sono” in Internos, 1999.
-
(1999)
Internos
-
-
Chiesa, R.1
-
39
-
-
85055827688
-
“Io ero Nobody e Tutte le Notti me ne Volavo in Francia
-
Raoul Chiesa, “Io ero Nobody e Tutte le Notti me ne Volavo in Francia, via Qatar” in Hacker Culture, 2001, http://www.dvara.net/HK/nobo-dy.asp.
-
(2001)
Hacker Culture
-
-
Chiesa, R.1
-
40
-
-
85055832881
-
“Un Esercito di Cyber-Pirati che Infestano la Rete in Cerca di Segreti Industriali
-
Carlotta Managnini, Grande Muraglia Hacker. “Un Esercito di Cyber-Pirati che Infestano la Rete in Cerca di Segreti Industriali. È il Volto Nascosto del Boom Cinese” in L’Espresso, 10 2005.
-
(2005)
L’Espresso
, vol.10
-
-
Managnini, C.1
Hacker, G.M.2
-
44
-
-
85055842893
-
-
2nd Ethical Hackers’ Speech @ SMAU2002, Milano, Blackhats Italia
-
Yvette Agostini, Raoul Chiesa, Storia ed Etica Hacker, 2nd Ethical Hackers’ Speech @ SMAU2002, Milano, 26 ottobre 2002, Blackhats Italia, http://www.clusit.it/smau_milano_2002/itbh_storia_ed_etica_hacker.pdf.
-
(2002)
, vol.26
-
-
Agostini, Y.1
Chiesa, R.2
-
46
-
-
85055773062
-
-
CORECOM (Comitato Regionale per le Comunicazioni), Pirata Sarai Tu! Atti del Convegno. Primo Convegno Nazionale sulla Pirateria, Torino, 31 marzo 2004, http://www.obiettivominori.it/be/public/view/Pirata%20 sari%20tu.pdf.
-
(2004)
Pirata Sarai Tu!
-
-
-
47
-
-
85055770488
-
Gadi Evron, Case-study: A Cyber-terrorism Attack. Analysis and Response
-
Kfir Damari, Ami Chayun, Gadi Evron, Case-study: a Cyber-terrorism Attack. Analysis and Response, beSIRT, 12 2006, http://www.beyondsecurity.com/.
-
(2006)
Besirt
, pp. 12
-
-
Damari, K.1
Chayun, A.2
-
52
-
-
85055788435
-
Client-Side Exploits: Forensic Analysis of a Compromised Laptop
-
Symantec Client-Side Exploits: Forensic Analysis of a Compromised Laptop, Incident Analysis, 17 2004, http://www.batori.com.br/downloads/040617-Analysis-FinancialInstitutionCompromise.pdf.
-
(2004)
Incident Analysis
, pp. 17
-
-
Symantec1
-
53
-
-
85055840985
-
-
Version: 1.00, Web Application Security Consortium
-
Web Application Security Consortium, Threat Classification, Version: 1.00, Web Application Security Consortium, 2004, http://www.we-bappsec.org.
-
(2004)
-
-
-
54
-
-
85055838870
-
-
SMAU, Milan, 28 October
-
Stefano Zanero for the Italian Blackhats Association, Ethical Hacking, Unethical Laws, SMAU, Milan, 28 October 2002, http://www.clusit.it/smau_milano_2002/itbh_ethica_hacking_unethical_laws.pdf.
-
(2002)
-
-
-
56
-
-
85055780389
-
-
Zone-H
-
Zone-H, 2004 Web Server Intrusion Statistics, Zone-H, 2005, http://www.securitymanagement.com/library/ZoneHorg0705.pdf.
-
(2005)
2004 Web Server Intrusion Statistics
-
-
-
57
-
-
85055783447
-
-
Associazione Italiana Blackhats, http://www.blackhats.it.
-
-
-
-
58
-
-
85055771382
-
-
CLUSIB (Club de la Sécurité Informatique Belge—Belgium), https://www.belcliv.be/clusib/.
-
-
-
-
59
-
-
85055859547
-
-
CLUSIF (Club de la Sécurité de l’Information Français—France), https://www.clusif.asso.fr/index.asp.
-
-
-
-
60
-
-
85055798409
-
-
CLUSIS (Association Suisse de la Sécurité des Systèmes d’Information— Switzerland), http://www.clusis.ch.
-
-
-
-
61
-
-
85055789479
-
-
CLUSIT (Associazione Italiana per la Sicurezza Informatica—Italy), http://www.clusit.it./.
-
-
-
-
62
-
-
85055803075
-
-
CLUSSIL (Club de la Sécurité des Systèmes d’Information—Luxemburg), http://www.clussil.lu/tiki-view_articles.php.
-
-
-
-
63
-
-
85055850579
-
-
ISECOM (Institute for Security and Open Methodologies), http://www.isecom.org./.
-
-
-
-
64
-
-
85055828961
-
-
Jargon File, http://www.catb.org/jargon/.
-
-
-
-
65
-
-
85055777561
-
-
Mitre, http://www.mitre.org/.
-
-
-
-
66
-
-
85055786699
-
-
Security Focus, http://www.securityfocus.com/
-
-
-
-
67
-
-
84979373785
-
Mechanism of Moral Disengagement in Terrorism
-
CambridgeUniversity Press, New York
-
Albert Bandura, “Mechanism of Moral Disengagement in Terrorism” in The Psycology of Terrorism: Behaviors, World Views, States of Mind, Cambridge University Press, New York, 1990.
-
Thepsycology of Terrorism: Behaviors, World Views, States of Mind
, pp. 1990
-
-
Bandura, A.1
-
68
-
-
24944522222
-
-
Giuffrè, Milano
-
Renato Borruso, Giovanni Buonomo, Giuseppe Corasanti, Gianfranco D’Aietti, Profili penali dell’informatica, Giuffrè, Milano, 1994.
-
(1994)
Profili Penali dell’informatica
-
-
Borruso, R.1
Buonomo, G.2
Corasanti, G.3
D’Aietti, G.4
-
74
-
-
0003868884
-
-
Jossey-Bass, San Francisco
-
John E. Douglas, Ann W. Burgess, Allen G. Burgess, Robert Ressler, Crime Classification Manual, Jossey-Bass, San Francisco, 1997.
-
(1997)
Crimeclassification Manual
-
-
Douglas, J.E.1
Burgess, A.W.2
Burgess, A.G.3
Ressler, R.4
-
78
-
-
59549094175
-
-
Giuffrè, Milano
-
Guglielmo Gulotta, Elementi di psicologia giuridica e di diritto psicologico: civile, penale, minorile, Giuffrè, Milano, 2000.
-
(2000)
Elementi Di Psicologia Giuridica E Di Diritto Psicologico: Civile, Penale, Minorile
-
-
Gulotta, G.1
-
83
-
-
84855716366
-
-
Springer, Dordrecht, The Netherlands
-
Ernesto U. Savona, Crime and Technology. New Frontiers for Regulation, Law Enforcement and Research, Springer, Dordrecht, The Netherlands, 2004.
-
(2004)
Crime and Technology. New Frontiers for Regulation, Lawenforcement and Research
-
-
Savona, E.U.1
-
88
-
-
33646362785
-
Validities and Abilities in Criminal Profiling: A Critique of the Studies Conducted by Richard Kocsis and His Colleagues
-
Sage Publications, June
-
Craig Bennell, Natalie J. Jones, Paul J. Taylor, Brent Snook, “Validities and Abilities in Criminal Profiling: A Critique of the Studies Conducted by Richard Kocsis and His Colleagues” in International Journal of Offender Therapy and Comparative Criminology, vol. 50, no. 3, Sage Publications, June 2006.
-
(2006)
International Journal of Offendertherapy and Comparative Criminology
, vol.50
, pp. 3
-
-
Bennell, C.1
Jones, N.J.2
Taylor, P.J.3
Snook, B.4
-
89
-
-
33745552591
-
Validities and Abilities in Criminal Profiling. The Dilemma for David Canters Investigative Psychology”
-
Sage Publications, August
-
Richard N. Kocsis, “Validities and Abilities in Criminal Profiling. The Dilemma for David Canter’s Investigative Psychology” in International Journal of Offender Therapy and Comparative Criminology, vol. 50, no. 4, Sage Publications, August 2006.
-
(2006)
Internationaljournal of Offender Therapy and Comparative Criminology
, vol.50
, pp. 4
-
-
Kocsis, R.N.1
-
90
-
-
27744504489
-
Cognitive Processes in Criminal Profiling Construction: A Preliminary Study
-
Sage, Publications
-
Richard N. Kocsis, Jenny Middledorp, Andrew C. Try, “Cognitive Processes in Criminal Profiling Construction: a Preliminary Study” in International Journal of Offender Therapy and Comparative Criminology, 49(6), Sage Publications, 2005.
-
(2005)
Internationaljournal of Offender Therapy and Comparative Criminology
, vol.49
, Issue.6
-
-
Kocsis, R.N.1
Middledorp, J.2
Try, R.C.3
-
92
-
-
85055841502
-
I “Cybercriminali: Rischi e Limiti dei Profili Criminologici”
-
Mucchi editore, Modena
-
Mara Mignone, “I “Cybercriminali”: Rischi e Limiti dei Profili Criminologici” in Ciberspazio e Diritto, vol. 1, no. 2, Mucchi editore, Modena, 2000, http://www.ciberspazioediritto.org/articoli/mignone.pdf.
-
(2000)
Ciberspazio E Diritto
, vol.1
, pp. 2
-
-
Mignone, M.1
-
93
-
-
85055779623
-
Banca Osama
-
2/2006, CESINT
-
Enzo Scannella, “Banca Osama. Le Finanze del Terrore” in Rivista di Intelligence, 2/2006, CESINT, 2006, pp. 62–71.
-
(2006)
Le Finanze del Terrore
, pp. 62-71
-
-
Scannella, E.1
-
94
-
-
43049098630
-
Deductive Criminal Profiling: Comparing Applied Methodologies Between Inductive and Deductive Criminal Profiling Techniques
-
Brent E. Turvey, “Deductive Criminal Profiling: Comparing Applied Methodologies Between Inductive and Deductive Criminal Profiling Techniques” Knowledge Solutions Library, January 1998.
-
(1998)
Knowledge Solutions Library
-
-
Turvey, B.E.1
-
95
-
-
84898837436
-
United Nations Manual on the Prevention and Control of Computer-Related Crime
-
United Nations, “United Nations Manual on the Prevention and Control of Computer-Related Crime,” in International Review of Criminal Policy, no. 43–44, 1990, http://www.uncjin.org/Documents/EighthCongress. html.
-
(1990)
International Review of Criminal Policy
, pp. 43-44
-
-
-
96
-
-
85055831940
-
Broadhurst, International Cooperation in Cybercrime Research
-
Bangkok
-
Roderic G. Broadhurst, International Cooperation in Cybercrime Research, in Proceedings 11th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: “Measures to Combat Computer Related Crime,” Bangkok, 18–25 2005, http://eprints.qut.edu.au/archive/00004448/.
-
(2005)
Proceedings 11Th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: “Measures to Combat Computer Related Crime,”
, pp. 18-25
-
-
Roderic, G.1
-
97
-
-
85055793189
-
-
31 March
-
Scott Charney, Combating Cybercrime: A Public-Private Strategy in the Digital Environment, 31 March 2005, http://www.nwacc.org/programs/conf05/UNCrimeCongressPaper.doc.
-
(2005)
-
-
Charney, S.1
-
98
-
-
85055819259
-
-
CLUSIF, An Overview of Cybercrime, 2004, 2005, http://www.clusif.asso.fr/.
-
(2004)
-
-
-
100
-
-
85055812513
-
-
GuyDe Vel, International cooperation to Prevent and Combat Cybercrime, in Proceedings 11th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: “Measures to Combat Computer Related Crime,” Bangkok, 18–25 April 2005, http://www.kicjp.re.kr/.
-
(2005)
-
-
Vel, G.1
-
101
-
-
85055779128
-
New Suit or Different Cut? Harmonizationis the Way
-
Ehab Maher Elsonbaty, Cyber Crime, New Suit or Different Cut? Harmonization is the Way, in Proceedings 11th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: “Measures to Combat Computer Related Crime” Bangkok, 18–25 2005, http://www.kicjp.re.kr/.
-
(2005)
Proceedings 11Th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: “Measures to Combat Computer Related Crime”
, pp. 18-25
-
-
Elsonbaty, E.M.1
Crime, C.2
-
102
-
-
85055815527
-
-
EURIM-IPPR, Partnership Policing for the Information Society—Fifth Discussion Paper: The Reporting of Cybercrime, 2004, http://www.eurim.org.uk/activities/ecrime/reporting.doc.
-
(2004)
-
-
-
103
-
-
85055808693
-
-
EURIM-IPPR, Partnership Policing for the Information Society—Fourth discus-sion paper: Reducing Opportunities for E-crime, 2004, http://www.eurim.org.uk/activities/ecrime/reducingops.doc.
-
(2004)
-
-
-
104
-
-
85055815024
-
-
Peter Grabosky, Recent Trends in Cybercrime, in Proceedings 11th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: “Measures to Combat Computer Related Crime,” Bangkok, 18–25 April, 2005, http://www.kicjp.re.kr/.
-
(2005)
, pp. 18-25
-
-
Grabosky, P.1
-
105
-
-
84902499888
-
-
Oxford Internet Institute, University of Oxford, mi2g, 10 February
-
D.K. Matai, Cyberland Security: Organised Crime, Terrorism and the Internet, Oxford Internet Institute, University of Oxford, mi2g, 10 February 2005.
-
(2005)
Cyberland Security: Organised Crime, Terrorism and the Internet
-
-
Matai, D.K.1
-
106
-
-
85055844083
-
-
International Conference on Crime and Technology: New Frontiers for Legislation, Law Enforcement and Research, Courmayeur Monte Bianco, Italy, November
-
Ernesto U. Savona, Mara Mignone, The Impact of Technology on Crime, International Conference on Crime and Technology: New Frontiers for Legislation, Law Enforcement and Research, Courmayeur Monte Bianco, Italy, 28–30 November 2003.
-
(2003)
The Impact of Technology on Crime
, pp. 28-30
-
-
Savona, E.U.1
Mignone, M.2
-
107
-
-
85055821874
-
-
A/CONF.203/14, United
-
United Nations, Workshop 6: Measures to Combat Computer Related Crime. Background Paper, in 11th United Nations Congress on Crime Prevention and Criminal Justice, Bangkok, 18–25 April 2005, A/CONF.203/14, United Nations, New York, 14 March 2005, http://www.unodc.org/unodc/en/commissions/crime-congresses-11-documents.html.
-
(2005)
11Th United Nations Congress on Crime Prevention and Criminal Justice
, pp. 18-25
-
-
-
108
-
-
85055816264
-
-
February
-
United States—White House, The National Strategy to Secure Cyberspace, February 2003, http://www.whitehouse.gov/pcipb/.
-
(2003)
-
-
-
109
-
-
85055774336
-
-
Academy of Behavioral Profiling, http://www.profiling.org/.
-
-
-
-
110
-
-
85055818222
-
-
Centre for Investigative Psychology, http://www.i-psy.com/.
-
-
-
-
111
-
-
85055787092
-
-
Criminal Profiling, http://www.criminalprofiling.com/.
-
-
-
-
112
-
-
85055784630
-
-
Criminal Profiling Research Site (CH), http://www.criminalprofiling.ch./.
-
-
-
|