152 results on '"Brenner, Susan W."'
Search Results
2. Cover
3. Introduction: Twenty-First-Century Bonnie and Clyde
4. 1. Hacking
5. 2. Malware and DDOs Attacks
6. 5. Cyber CSI: The Evidentiary Challenges of Digital Crime Scenes
7. 4. Cybercrimes against Persons
8. 3. Cybercrimes against Property
9. 6. Cybercrime Investigations and Privacy
10. 8. Mutating Cyberthreats: Crime, Terrorism, and War
11. 7. Transnational Investigation of Cybercrime
12. Epilogue
13. Index
14. Notes
15. 10. The Council of Europe’s Convention on Cybercrime
16. Nanocrime 2.0
17. Cybercrime and the Law : Balancing Privacy Against the Need for Security
18. Cybercrime Havens: Challenges and Solutions
19. "At Light Speed": Attribution and Response to Cybercrime/Terrorism/Warfare
20. Why the Law Enforcement Model Is a Problematic Strategy for Dealing with Terrorist Activity Online
21. Commentary on the Preliminary Draft of the Sentencing Guidelines Issued by the United States Sentencing Commission in September, 1986
22. Civilians in cyberwarfare: conscripts.
23. Fantasy crime: the role of criminal law in virtual worlds.
24. Cybercrime jurisdiction
25. Should online defamation be criminalized?
26. State-sponsored crime: the futility of the Economic Espionage Act.
27. Law in an era of pervasive technology.
28. Fourth Amendment protection for shared privacy rights instored transactional data.
29. Introduction—Cybercrime: A Note on International Issues
30. U.S. Cybercrime Law: Defining Offenses
31. The Fourth Amendment in an era of ubiquitous technology.
32. Distributed security: preventing cybercrime.
33. The Trojan horse defense in cybercrime cases.
34. Toward a criminal law for cyberspace: a new model of law enforcement?
35. Toward a criminal law for cyberspace: distributed security.
36. Complicit publication: when should the dissemination of ideas and data be criminalized?
37. Attribution: Attackers
38. Response: Where We Are
39. Where Do We Go From Here?
40. Order & Disorder: Crime, War, and Terrorism
41. Introduction
42. How Did We Get Here?
43. Cyberthreats: New Issues, New Challenges
44. In defense of cyberterrorism: an argument for anticipating cyber-attacks.
45. Transnational evidence gathering and local prosecution of international cybercrime.
46. Constitutional Rights and New Technologies in The United States
47. History of computer crime
48. Chapter 1 Should Commercial Misuse of Private Data be a Crime?
49. Requiring protocols in computer search warrants
50. Internet law in the courts.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.