Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Acknowledgements Dedication About the Authors About the Technical Editor Foreword Preface
How This Book is Organized
Introduction. Cyber X: Criminal Syndicates, Nation states, Sub-National Entities and Beyond
Introduction Classifying the Cyber Actor Criminal and Organized Syndicates Nation States Summary References
Chapter 1. Psychological and Cultural Trends
Introduction Psychology of Attackers Psychology of Victims Attackers’ Familiarity with Human Psychology Motivations and Event-Driven Trends Summary References
Chapter 2. Seasons of Change
Introduction From Experiment to Exposé to Exploit Timeline: Innovations, Intrigue, and Intrusions Propaganda and Lulz Summary References
Chapter 3. Drivers and Motives
Introduction Technology Advancements and Their Effect on Crime Motives for Committing Cybercrime Opportunistic Cybercrime Cost Model Summary References
Chapter 4. Signal-to-Noise Ratio
Introduction Cyber Attacks: The Early Years The Pendulum Swings Back: Hacktivism and DDoS Summary References
Chapter 5. Execution
Introduction How Cybercriminals Execute Their Schemes Using Malicious Code and Content for Profit Identifying the Market Identifying the Target Audience Summary References
Chapter 6. From Russia with Love
Introduction A Bit of History The Cold War and Its Significance to Cybercrime Why the Russians Understand Economics Better Than You Do Cyber Thieves Cyber Rackets: Botnets, Malware, Phishing, and the Rise of the Russian Cybercriminal Underground Summary References
Chapter 7. The China Factor
Introduction Economic Growth Industrial Espionage Reducing the Risk of Industrial Espionage Security Spend Model Summary References
Chapter 8. Pawns and Mules
Introduction Pawns in the Game The Heartland Breach Acquiring and Transporting Stolen Assets without Being Detected From Money Mules to Money Laundering Summary References
Chapter 9. Globalization: Emerging Markets Aren’t Just for Traditional Investors Anymore
Introduction References
Chapter 10. America, Land of Opportunity
Introduction The Birth of the Modern Internet When Purpose Is Corrupted by Conflicting Intent Defining the Norm: The Era of the Cybercriminal on America’s Internet Locking the Doors while Opening the Windows: Inviting the Cybercriminal into Our World and Our Lives Does Education Decrease Cybercrime in the United States? Industrial Espionage and the American Experience When the Crime Is Not Motivated by Economics Summary References
Chapter 11. Global Law Enforcement
Introduction Cybercrime Today U.S. Federal Law Enforcement Nonfederal Law Enforcement Summary References
Chapter 12. The Road Ahead
Introduction John Pirc: “Keeping Security Real” Will Gragido Nick Selby Daniel Molina Summary References
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion