Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Cybercrime: Vandalizing the Information Society", Steven Furnell

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKCYBCRM.RVW 20030121 Cybercrime: Vandalizing the Information Society , Steven Furnell, 2002, 0-201-72159-7, U$29.99/C$44.95 %A Steven Furnell %C P.O.
    Message 1 of 1 , Feb 6, 2003
      BKCYBCRM.RVW 20030121

      "Cybercrime: Vandalizing the Information Society", Steven Furnell,
      2002, 0-201-72159-7, U$29.99/C$44.95
      %A Steven Furnell
      %C P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario M3C 2T8
      %D 2002
      %G 0-201-72159-7
      %I Addison-Wesley Publishing Co.
      %O U$29.99/C$44.95 416-447-5101 fax: 416-443-0948 bkexpress@...
      %O http://www.amazon.com/exec/obidos/ASIN/0201721597/robsladesinterne
      %P 316 p.
      %T "Cybercrime: Vandalizing the Information Society"

      The preface states that this book is a general introduction to
      cybercrime, directed at any audience, and requiring no specific
      technical background. With certain provisos, those objectives are

      Chapter one is a historical look at information and the rise of the
      net, dealing particularly with basic concepts and security. Computer
      related crime is said to be happening, in chapter two, and some
      anecdotal examples are given. Blackhat "celebrities" and groups are
      examined in chapter three. While the jargon that Furnell uses tends
      to come from the media, his research is obviously superior to that of
      many similar books on the topic. Chapter four lists some exploits and
      attack approaches. Malware, in chapter five, also shows better than
      normal investigation, although some of the terminology is dated.
      Societal aspects of cybercrime, in chapter six, seems to rely
      primarily on opinion surveys, but there is some interesting material
      on laws and the public perception of cybercriminals. Recent
      developments, such as ethical hacking, hacktivism, information
      warfare, and cyberterrorism, are collected in chapter seven. Chapter
      eight lists some recommended security practices.

      The book does fall into the all-too-usual trap of concentrating on the
      sensational side of information and network related crime (that of the
      outside, and targeted, intruder), and therefore fails to provide a
      complete picture. However, within its limits, the work does present a
      reasonable and balanced view.

      copyright, Robert M. Slade, 2003 BKCYBCRM.RVW 20030121

      rslade@... rslade@... slade@... p1@...
      Find book info victoria.tc.ca/techrev/ or sun.soci.niu.edu/~rslade/
      Upcoming (ISC)^2 CISSP CBK review seminars (+1-888-333-4458):
      March 31, 2003 Indianapolis, IN
    Your message has been successfully submitted and would be delivered to recipients shortly.