Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Polk State College is committed to equal access/equal opportunity in its programs, activities, and employment. For additional information, visit polk.edu/equity.
Welcome to the Polk State College library guide for cybercrime related research topics. Below you will find suggested books/ebooks and recommended databases. If you need help, click the link for Ask a Librarian.
Introduction to Cybercrime by
Publication Date: 2016-02-22
As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity from copyright infringement to phishing to online pornography has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts if any could deter cybercrime in the highly networked and extremely fast-moving modern world?
Cybercrime and Cyber Warfare by
Publication Date: 2014-02-19
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime.
Encyclopedia of Cybercrime by
Publication Date: 2009-01-01
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and telecommunications technologies have increasingly threatened societies as they have become reliant on information systems for sustaining modernized living. Cybercrime is not a new phenomenon, rather an evolving one with respect to adoption of information technology (IT) for abusive and criminal purposes. Further, by virtue of the myriad ways in which IT is abused, it represents a technological shift in the nature of crime rather than a new form of criminal behavior. Understanding the subject, then, is imperative to combating it and to addressing it at various levels.
Placing the Suspect Behind the Keyboard by
Publication Date: 2013-02-01
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.
Call Number: Polk/Winter Haven & Lakeland Circulation (U167.5.C92C935 2017)
Publication Date: 2017-12-15
There is warfare, and there is cyberwarfare. In today's technologically-driven world, governments, and even terrorist groups and hacktivists, engage in cyberwarfare to attack or disrupt the operations of other nations and organizations. Recent revelations about cyberattacks that threatened individual and national security have caused ripples of concern and outrage, but tend to die down quickly. How safe are we, and do we take security for granted? This resource offers a diverse selection of viewpoints from the top voices in the field to enlighten readers about warfare in the Information Age.
Call Number: Polk/Winter Haven & Lakeland Circulation (HV6773 .B75 2010)
Publication Date: 2010-01-01
This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to society. * A chronology traces the emergence and evolution of cybercrime from the 1950s to the present * Detailed descriptions and analysis of real cybercrime cases illustrate what cybercrime is and how cybercriminals operate
Cyber Crime by
Call Number: Polk/Winter Haven Circulation (HV6773 .C913 2009)
Publication Date: 2008-11-07
Opposing Viewpoints: Cyber Crime
presents a collection of essays with differing viewpoints on cyber crime. Contains discussions on contributing factors, the role of consumers, and prevention through legal action. Also includes a list of organizations to contact.
Call Number: Polk/Winter Haven & Lakeland Circulation (HV6773 .C918 2016)
Publication Date: 2016-01-19
Chapter 1 : Does cybercrime pose a serious problem for US security? Chapter 2 : Is cybercrime against individuals a serious problem? Chapter 3 : How should US cybersecurity be improved? Chapter 4 : What should be done to protect Internet users from cybercrime?
Criminal Justice Covers a wide variety of criminal justice topics, including corrections administration, law enforcement, social work, industrial security, drug rehabilitation, and criminal and family law.
Criminal Justice Abstracts with Full Text This comprehensive database includes full text and bibliographic records of leading journals in the criminal justice field. Covering a wide range of topics, it is an essential collection for students and scholars researching criminal justice and criminology.
America's News With unmatched U.S. news content from local, regional, and national sources, this resource is the largest of its kind. Its diverse source types include printed and online newspapers, blogs, journals, newswires, broadcast transcripts and videos. Explore a specific issue or event through the detailed coverage provided by local reporting or compare a wide variety of viewpoints from across the country on topics such as politics, business, health, sports, cultural activities and people.
Opposing Viewpoints in Context The premier online resource covering today’s hottest social issues, from capital punishment to immigration, to marijuana. This cross-curricular research tool supports science, social studies, current events, and language arts classes. Its informed differing views present each side of an issue, allowing you to draw your own valid conclusions.
Academic Search Complete Academic Search Complete, designed specifically for academic institutions, is the world's most valuable and comprehensive scholarly, multi-disciplinary full-text database, with more than 5,300 full-text periodicals, including 4,400 peer-reviewed journals. In addition to full text, this database offers indexing and abstracts for more than 9,300 journals and a total of 10,900 publications including monographs, reports, conference proceedings, etc. The database features PDF content going back as far as 1865, with the majority of full text titles in native (searchable) PDF format.
You must log in to use library databases and eBooks. Your borrower ID is your student ID number (no dashes). Your pin/password is the last four digits of your student ID number.