Journal of Engineering and Applied Sciences

Year: 2013
Volume: 8
Issue: 7
Page No. 225 - 229

Hacking and Cyber Crimes: A Preventive Guide

Authors : Akram Moustafa, Mohammed M. Al-Shomrani, Abdusamad Al-Marghirani and Ahmad A. Al-Rababah

References

Brenner, S.W., 2010. Cybercrime: Criminal Threats from Cyberspace. Pentagon Press, Santa Barbara, ISBN-13: 9788182746145, Pages: 294.

Carr, J., 2012. Inside Cyber Warfare. 2nd Edn., O'Reilly Media, Inc., Sebastopol, CA., Pages: 318.

Davidoff, S. and J. Ham, 2012. Network Forensics: Tracking Hackers through Cyberspace. Prentice Hall, USA, ISBN-13: 9780132564717, Pages: 576.

Halder, D. and K. Jaishankar, 2011. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. Idea Group Inc (IGI), Hershey, PA, USA, ISBN-13: 9781609608309, Pages: 267.

Janczewski, L.J. and A.M. Colarik, 2008. Cyber Warfare and Cyber Terrorism. Idea Group Inc. (IGI), USA., ISBN: 9781591409922, Pages: 532.

Mathew, A.R., A. Al Hajj and K. Al Ruqeishi, 2010. Cyber crimes: Threats and protection. Proceedings of the International Conference on Networking and Information Technology, June 11-12, 2010, Manila, pp: 16-18.

Oriyano, S.P. and M. Gregg, 2011. Hacker Techniques, Tools and Incident Handling. Superior Solutions, Inc., Houston, ISBN-13: 9780763791834, Pages: 400.

Schaeffer, B.S., H. Chan, H. Chan and S. Ogulnick, 2009. Cyber crime and cyber security: A white paper for franchisors, licensors and others. http://business.cch.com/franlaw/cybercrime_whitepaper.pdf.

Shinder, D.L. and M. Cross, 2008. Science of the Cybercrime: Computer Forensics Handbook. Syngress Publishing Inc., USA.

Stuttard, D. and M. Pinto, 2011. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaw. 2nd Edn., John Wiley and Sons, Inc., New York.

Vacca, J.R., 2009. Computer and Information Security Handbook. Morgan Kaufmann, Burlington, MA., ISBN-13: 9780080921945, Pages: 928.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved