Journal of Engineering and Applied Sciences
Year:
2013
Volume:
8
Issue:
7
Page No.
225 - 229
References
Brenner, S.W., 2010. Cybercrime: Criminal Threats from Cyberspace. Pentagon Press, Santa Barbara, ISBN-13: 9788182746145, Pages: 294.
Carr, J., 2012. Inside Cyber Warfare. 2nd Edn., O'Reilly Media, Inc., Sebastopol, CA., Pages: 318.
Davidoff, S. and J. Ham, 2012. Network Forensics: Tracking Hackers through Cyberspace. Prentice Hall, USA, ISBN-13: 9780132564717, Pages: 576.
Halder, D. and K. Jaishankar, 2011. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. Idea Group Inc (IGI), Hershey, PA, USA, ISBN-13: 9781609608309, Pages: 267.
Janczewski, L.J. and A.M. Colarik, 2008. Cyber Warfare and Cyber Terrorism. Idea Group Inc. (IGI), USA., ISBN: 9781591409922, Pages: 532.
Mathew, A.R., A. Al Hajj and K. Al Ruqeishi, 2010. Cyber crimes: Threats and protection. Proceedings of the International Conference on Networking and Information Technology, June 11-12, 2010, Manila, pp: 16-18.
Oriyano, S.P. and M. Gregg, 2011. Hacker Techniques, Tools and Incident Handling. Superior Solutions, Inc., Houston, ISBN-13: 9780763791834, Pages: 400.
Schaeffer, B.S., H. Chan, H. Chan and S. Ogulnick, 2009. Cyber crime and cyber security: A white paper for franchisors, licensors and others. http://business.cch.com/franlaw/cybercrime_whitepaper.pdf.
Shinder, D.L. and M. Cross, 2008. Science of the Cybercrime: Computer Forensics Handbook. Syngress Publishing Inc., USA.
Stuttard, D. and M. Pinto, 2011. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaw. 2nd Edn., John Wiley and Sons, Inc., New York.
Vacca, J.R., 2009. Computer and Information Security Handbook. Morgan Kaufmann, Burlington, MA., ISBN-13: 9780080921945, Pages: 928.