Hackers Portfolio And Its Impact On Society
Abstract
Keywords
Full Text:
PDFReferences
Axmith, B. (2011). “Israel's computers crash after hacker group vows retaliation†Digital Journal. Retrieved from: http://digitaljournal.com/article/314013#ixzz2Nj73bBgK
Buller, A. (2013). “The Coming of Cyber War I†Retrieved from: http://gulfbusiness.com/2013/03/the-coming-of-cyber-world-war-i/
Callwood, K. (2013). “How to Reduce Hacking†eHow.com Retrieved from:
http://www.ehow.com/how_8663856_reduce-hacking.html#ixzz2Of7JZqMC
Canter, D. (2013). “Fighting an Order to fight cybercrime†Bloomberg BusinessWeek March 11- March 17, 2013.
Chakraborty, B. (2013). “Small firm hit by 3-year hacking campaign puts face on growing cyber problem†Foxnews.com Retrieved from: http://www.foxnews.com/politics/2013/02/22/small-businesses-big-targets-for-cyber-snoops/#ixzz2Ngj7XMli
Computer Weekly (2006). “Act on foreign spy risk, firms urged†Retrieved from: http://www.computerweekly.com/articles/2006/12/01/220307/act-on-foreign-spy-risk-firms-urged.htm
Dillow, C. (2012). “In the last year, hackers gained ‘Full Functional Control’ of NASA networks, stole the control codes for the is†POPSCI. Retrieved from: http://www.popsci.com/technology/article/2012-03/hackers-gained-full-functional-control-nasa-networks-stole-control-codes-iss-last-year
Engleman, E. (2013). “Hacked? Who Ya Gonna Call?†Bloomberg BusinessWeek February 11- February 17, 2013
Hatcher, W. (2013). “Cyber Security helping secure one network at a time†Retrieved from:
http://iselama.typepad.com/files/scada2pub-1.pdf
New Orleans Business News (2011). “Hackers in China hit Western oil companies, security firm reports†The Associated Press. Retrieved from: http://www.nola.com/business/index.ssf/2011/02/hackers_in_china_hit_western_o.html
Perlroth, N. (2013). “Hacker in China Attacked the Times for last 4 months†The New York Times. Retrieved from: http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0
Parker, D. (1998). “Fighting Computer Crime: A New Framework for Protecting Information†Retrieved from: http://education.illinois.edu/wp/crime/hacking.htm
Peters, J. (2013). “America's Awful Computer-Crime Law Might Be Getting a Whole Lot Worse†Retrieved from:http://www.slate.com/blogs/crime/2013/03/25/computer_fraud_and_abuse_act_the_cfaa_america_s_awful_computer_crime_law.html
Silverman, J. (2007). "Could hackers devastate the U.S. economy?". HowStuffWorks.com. Retrieved from: http://computer.howstuffworks.com/die-hard-hacker.htm.
Stone, D. (1999). “Computer Hackingâ€, University Laboratory High School, Retrieved from: http://www.ed.uiuc.edu/wp/crime/hacking.htm
U.S. Department of Justice (2009-2012). Computer Crime and Intellectual Property Section Press Releases. Retrieved from: http://www.justice.gov/criminal/cybercrime/pr.html
Wooten, D. (2009). “Hacking: modern day threat or hobby? (pt. 1)â€. Retrieved from: http://www.examiner.com/x-13831-Computer-Security-Examiner~y2009m6d22-Hacking-modern-day-threat-or-hobby-pt-1#
Refbacks
- There are currently no refbacks.
ISSN: 1694-2507 (Print)
ISSN: 1694-2108 (Online)