Computer Crime: Electronic Fund Transfer Systems and Crime
Washington, DC: GPO, 1982. 28 cm, 182, wraps, illus., forms, covers somewhat worn and soiled, front edge slightly turned. More
Washington, DC: GPO, 1982. 28 cm, 182, wraps, illus., forms, covers somewhat worn and soiled, front edge slightly turned. More
Northborough, MA: Computer Security Institute, 1986. 3-ring binder with approximately 2" of materials & tabbed binders, includes an exhibit directory (approx. 30 pages). More
San Francisco: Computer Security Institute, 1986. Presumed first compilation thus. Three Ring Binder. Approximately 1.5 inches of material. These handouts were from the Thirteenth Annual Computer Conference. Handouts (typically Xerox copies) include text pages and vugraphs. The Computer Security Institute (CSI) was a professional organization serving practitioners of information, network, and computer-enabled physical security, from the level of system administrator to the chief information security officer. CSI, established in 1974, was San Francisco-based. It had thousands of members worldwide and provided a wide variety of information and education programs to assist practitioners in protecting the information assets of corporations and governmental organizations. CSI used to conduct two conferences per year — the Annual Computer Security Conference and Exhibition and CSI SX. CSI is perhaps best known for the annual CSI/FBI Computer Crime and Security Survey. In 2011, CSI was absorbed by UBM although no mention of this appears on the UBM Wikipedia page. More
Northborough, MA: Computer Security Institute, 1987. First Thus? Printing. 1987, ringbound, illus., index, cover of three-ring binder somewhat soiled. More
Franklin, TN: Computer Sentry Software, Inc., 1998. Demonstration copy. Presumed first thus (note initial copyright date is 1996). Software disks and instructions. Packaging is approximately 5.5 inches by 6 inches, with pocket for disk and information inside each cover. Sticker on cover states: Global Export Powerful Encryption Approved by the U. S. Department of Commerce. Founded in 1997, Computer Sentry Software is a leading provider of specialized security consulting services and is a licensed provider of security, investigations and training services. Best known for its focus on personal protection and information security, it provides end to end solutions that are discrete and designed to meet unique requirements. When engaged as “White Label” service providers, Computer Sentry Software provides seamless and transparent subject matter expertise, back office and operational support to clients who wish services that require additional support to ensure a high-quality service solution. Computer Sentry Software, Inc. is a licensed Agency and a registered training provider under the Private Security and Investigative Services Act. More
Delran, NJ: Datapro Research Corporation, 1987. 30 cm, approx. 1600, 2-vol. set in loose-leaf ring binders, illus., glossary, index, user's guide, binders somewhat worn and soiled. More
New Delhi: Saakshar Law Publications, 2004. Second Edition. Presumed first printing. Hardcover. xxxii, 729, [1] pages. Occasional footnotes. Case Index. Subject Index. Inscription signed and dated by author on fep. DJ has slight wear and soiling. The author was an Advocate associated with the Supreme Court of India. Pavan Duggal is an advocate specialized in the field of Cyberlaw, E-Commerce law. He is also a member of NOMCOM Committee on Multilingual Internet Names Consortium (MINC). Pavan's was for some time a recognized face as an English newsreader with the Indian state run television network Doordarshan. Pavan Duggal is the Conference Director of the International Conference on Cyberlaw, Cybercrime & Cybersecurity organized by CyberlawsNet. Duggal has commented on what needs to be done to curb the menace of Internet misuse in India, given the fact that there have been only 7 convictions in cybercrime cases, ever since the launch of internet services in India, approximately 18 years ago. More
New York: Ballantine Books, 2010. Ballantine Books Mass Market Edition [stated]. First printing [stated]. Mass market paperback. [6], 345, [1] pages. Cover has some wear and soiling. Barry Mark Eisler (born 1964) is a best-selling American novelist. He is the author of two thriller series, the first featuring anti-hero John Rain, a half-Japanese, half-American former soldier turned freelance assassin, and a second featuring black operations soldier Ben Treven. Eisler also writes about politics and language on his blog Heart of the Matter, and at CHUD, Firedoglake, Huffington Post, Smirking Chimp, and Truthout. Eisler joined the CIA, where he held a covert position with the Directorate of Operations. In 1992, he resigned after becoming disillusioned. In 1994, he moved to the San Francisco area to work for a law firm's technology licensing division, then left to work in Japan for Matsushita. In 2003 he sold the rights to his debut novel, Rain Fall, the first of his series featuring John Rain. In March 2011, he walked away from a reported half million dollar advance from St. Martin's Press to go the self-publishing route pioneered by Joe Konrath and others. He then agreed to publish the seventh John Rain novel, The Detachment, under Amazon Publishing's Thomas & Mercer imprint. After terminating his previous publishing contracts and regaining his rights, Eisler changed the covers on several Treven books. More
Albuquerque, NM: U.S. Department of Energy, Albuquerque Operations Office, 1990. NWCNET-90-02 Version 1.0--Xerox reproduction (believed contemporary with publication date). Disbound, held together with a binder clip. [2], 26, [4] pages, printed on one side only. Rare surviving copy. The purpose of this document was to provide a list of tests to be performed when bring up a NWCnet note, after installing a major upgrade to the system - either software or hardware, upon suspicious performance of the system, or upon request of either local site management or DOE management. This document was expected to change to reflect evolving testing needs. Sites were encouraged to add site specific tests to this test suite. The original set of security tests was developed under the direction of the DOE Center for Computer Security. The original set of functional tests were developed by an independent test team charged with testing the initial operations of the NWCnet with electronic connections. The objective of the Nuclear Weapons Complex Network (NWCNet) was to facilitate the exchange, storage, and management of shareable product definition information classified as high as Secret Restricted Data. The NWCnet was designed to be be operated in a system-high manner by Q-cleared personnel. The NWCnet contained four service components: the Wide-Band Communications Network (WBCN), the Common File System (CFS), the Network Systems Corporation (NSC) Hyperchannel, and the local computing resources (worker computers). The worker computers allow local users to initiate data transfer utilizing the NWCnet. From the Internet: NWCNET stands for Nuclear Weapons Complex Network. This definition appears very rarely and is found in the following Acronym Finder categories: Military and Government. More
Boulder, CO: CEP Inc., 1985. Updated Edition. Wraps. 505 pages, wraps, illus., diagrams, tape residue at bottom of spine, some wear and soiling to covers. Lee Lapin, 1948–2009, was a popular surveillance and espionage author, best known for his offbeat, grammatically questionable, yet information-rich instructional book series, How to Get Anything On Anybody. The series is published by Paladin Press, is now in its third revision, and is frequently included in library collections across North America. Lapin reportedly lived on a small island off the coast of Marin County, California where, for relaxation, he raised wolves. Lee Lapin was the nom de plume of Scott French. He died January 11, 2009, at the home of his son in Colorado. More
New York: Simon & Schuster, 1991. First Printing. 368, notes on sources, index, some soiling to fore-edge, slight wear to DJ edges. More
Gaithersburg, MD: U.S. Dept. of Commerce, NIST, 1989. 28 cm, 15, wraps, mailing label removed from rear cover. More
Miamisburg, OH: Mound Monsanto Research Corporation, 1985. Presumed First Edition, First printing of this revision. Staplebound, Three-hole punched. 21 pages, printed on one side only. References. The author was a federal employee at the Dayton Area Office. Few Mound administrative documents have survived after its closure. Mound Laboratories in Miamisburg, Ohio was an Atomic Energy Commission (later Department of Energy) facility for nuclear weapon research during the Cold War, named after the nearby Miami Indian burial mound. The laboratory grew out of the World War II era Dayton Project (a site within the Manhattan Project) where the neutron generating triggers for the first plutonium bombs were developed. Post-war construction of a permanent site for Dayton Project activities began in 1947. The lab was originally known as the Dayton Engineer Works. The lab began operations in 1948 and was managed by Monsanto. Mound produced detonators, cable assemblies, timers, firing sets, and other equipment. In 1954, Mound began working with tritium. The lab disassembled bomb components, recovering the tritium within and sending it for repurification at Savannah River Site. Mound supplied enriched non-radioactive isotopes. The lab also produced plutonium-238-powered thermoelectric heat sources called SNAP or Systems for Nuclear Auxiliary Power for the U.S. space program. Mound was declared a Superfund site and was put on the National Priorities list in 1989. A decision was made to close the plant by 2006. Cleanup of the site began in 1995. Work with tritium ended in 1997. More
Washington DC: Homeland Security Acquisition Institute, 2016. Presumed First Edition, First printing thus. Spiral bound. 29, [1] pages. Illustrations (some with color). The instructor was Richard Burke. Burke is a seasoned homeland and national security expert with more than 20 years of public and private sector experience. Before joining Delta Risk, Burke served as a Principal with Capgemini Government Solutions, where he led and managed all delivery and business development responsibilities in the Homeland Security practice. Burke was a member of the Senior Executive Service at the U.S. Department of Homeland Security (DHS), leading planning and crisis management operations across all homeland security missions, including anti-terrorism, disaster response, borders/immigration and cyber. Burke served in the U.S. Marine Corps as a judge advocate and logistician, including service during Operation Enduring Freedom. Burke is a Senior Fellow at George Washington University’s Center for Cyber & Homeland Security. Burke holds a Master’s Degree in National Security Strategy from the National War College. More
Hong Kong: Office of the Privacy Comm. 1998. First? Edition. First? Printing. 30, wraps, glossary, slight wear and soiling to covers. Contains 15 pages in English and 15 pages in Chinese. More
Armonk, NY: IBM, 1997. 28 cm, wraps, illus. More
Armonk, NY: IBM, 1999. 28 cm, wraps, illus. More
Armonk, NY: IBM, 1999. 28 cm, wraps, illus. More
Washington, DC: GPO, [1985]. First? Printing. 28 cm, 39, wraps, illus., bibliography, some wear and soiling. Issued by the National Bureau of Standards. More
Washington DC: U. S. Government Printing Office, 1985. Presumed First Edition, First printing. Wraps. Various paginations (NBS Form 114A (Rev. 2-80) lists 41 pages. Figures. Checklist. References and Additional Readings. Cover has some wear and soiling. This publication addresses the issue of selecting ADP backup processing support in advance of events that cause the loss of data processing capability. The document emphasizes the need for managers at all levels of the organization to support the planning, funding, and testing of an alternate processing strategy. It provides a general description of the alternatives, and recommends criteria for selecting the most suitable alternate processing method. More
Kansas City, MO: Honeywell Federal Manufacturing & Technologies (FM&T), Kansas City Plant, 1999. Presumed First Edition, First printing thus. Folder, with stapled vugraph presentation inside. 21, [1] pages in a two pocket folder. Illustrations. A Stand-Down presentation is typically given to the entire workforce, ideally simultaneously but often in smaller groups and at different times depending on whether the location has multiple work shifts. This presentation has vugraph image and talking points per page. This type of ephemeral item rarely survives the event it is used at. Very few likely survive for a period of two or more decades as this has. Honeywell Federal Manufacturing & Technologies (FM&T) manages and operates the Kansas City National Security Campus for the U.S Department of Energy. This engineering, manufacturing and sourcing enterprise delivers trusted national security products and government services primarily for the National Nuclear Security Administration. Our culture of continuous improvement enables us to deliver responsive, collaborative and innovative management and technology solutions that translate into cost savings for our customer and taxpayers. More
Gaithersburg, MD: U.S. Department of Commerce, [1984]. 28 cm, 331, wraps, illus., damage to rear cover (soiling and hole). More
Northborough, MA: Computer Security Institute, 1987. Presumed First Edition, First printing thus. Wraps. 6 pages, and two page Today's Plan template laid in. Three-hole punched. This was published bimonthly and circulation was restricted to members of the institute was not sold by subscription. The Computer Security Institute (CSI) was a professional membership organization serving practitioners of information, network, and computer-enabled physical security, from the level of system administrator to the chief information security officer. CSI, established in 1974, was a San Francisco-based association of information security professionals. It had thousands of members worldwide and provided a wide variety of information and education programs to assist practitioners in protecting the information assets of corporations and governmental organizations. CSI used to conduct two conferences per year — the Annual Computer Security Conference and Exhibition and CSI SX. CSI is best known for the annual CSI/FBI Computer Crime and Security Survey. In 2011, CSI was absorbed by UBM. More
Northborough, MA: Computer Security Institute, 1986. Presumed First Edition, First printing this issue. Wraps. 6 pages with 2 page supplement (Dial-up Access). Three-hole punched. The Computer Security Institute (CSI) was a professional membership organization serving practitioners of information, network, and computer-enabled physical security, from the level of system administrator to the chief information security officer. It was founded in 1974. CSI used to conduct two conferences per year — the Annual Computer Security Conference and Exhibition and CSI SX. Internet entrepreneur Jimmy Wales was a keynote speaker at CSI’s Annual Conference, held November 6–8, 2006, in Orlando, Florida. CSI is perhaps best known for the annual CSI/FBI Computer Crime and Security Survey that it began to conduct in 1996 in collaboration with the San Francisco Federal Bureau of Investigation's Computer Intrusion Squad and researchers from the Robert H. Smith School of Business at the University of Maryland. In 2011, CSI was absorbed by UBM although no mention of this appears on the UBM Wikipedia page. More
Northborough, MA: Computer Security Institute, 198. Presumed First Edition, First printing this issue. Wraps. 6 pages with 2 page Member Survey insert. Three-hole punched. Corner creased. Ink notation on last page. The Computer Security Institute (CSI) was a professional membership organization serving practitioners of information, network, and computer-enabled physical security, from the level of system administrator to the chief information security officer. It was founded in 1974. CSI used to conduct two conferences per year — the Annual Computer Security Conference and Exhibition and CSI SX. Internet entrepreneur Jimmy Wales was a keynote speaker at CSI’s Annual Conference, held November 6–8, 2006, in Orlando, Florida. CSI is perhaps best known for the annual CSI/FBI Computer Crime and Security Survey that it began to conduct in 1996 in collaboration with the San Francisco Federal Bureau of Investigation's Computer Intrusion Squad and researchers from the Robert H. Smith School of Business at the University of Maryland. In 2011, CSI was absorbed by UBM. More