User:Mcblack1/Books/Computing Legislation
The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
Computing Fraud and Legislation[edit]
- CAN-SPAM Act of 2003
- Computer Fraud and Abuse Act
- Comprehensive Crime Control Act of 1984
- Patriot Act
- Racketeer Influenced and Corrupt Organizations Act
- Espionage Act of 1917
- Stored Communications Act
- United States v. Drew
- Electronic Communications Privacy Act
- California Comprehensive Computer Data Access and Fraud Act
- Defense Secrets Act of 1911
- McCarran Internal Security Act
- Computer fraud
- Information technology security audit
- Hacker (computer security)
- 1984 Network Liberty Alliance
- 2012 LinkedIn hack
- 2012 Yahoo! Voices hack
- Advanced persistent threat
- Antisec Movement
- AOHell
- Attack patterns
- Itzhak "Zuk" Avraham
- Mustafa Al-Bassam
- BBS: The Documentary
- Black hat
- Loyd Blankenship
- Bluebugging
- BlueHat
- Bluesnarfing
- Elie Bursztein
- Camfecting
- Certified Ethical Hacker
- Clickjacking
- Climatic Research Unit documents
- List of computer criminals
- Computer Misuse Act 1990
- Content Security Policy
- Cookiejacking
- Cracking of wireless networks
- Cross-site scripting
- The Cuckoo's Egg
- Cyber ShockWave
- Cyber spying
- Cyber-arms industry
- Cyber-collection
- Cyberstrategy 3.0
- Cyberwarfare
- Cyberwarfare in the United States
- Decocidio
- DNS hijacking
- DNS spoofing
- DNSChanger
- Daniel Domscheit-Berg
- Doxing
- Fabien Duchene
- ELearnSecurity
- Email hacking
- Fake AP
- File binder
- Firesheep
- Form grabbing
- Frame injection
- Fully undetectable
- Albert Gonzalez
- Great Cannon
- Great Hacker War
- Grey hat
- Network Crack Program Hacker Group
- Hacker (term)
- Hacker Manifesto
- The Hacker Wars
- The Hacker's Handbook
- Hackers Are People Too
- Hackers in Wonderland
- Hackers Wanted
- Cyberwarfare in China
- Hacking tool
- HackThisSite
- Hacktivism
- Markus Hess
- High-Tech Bridge
- Junaid Hussain
- ISP redirect page
- Jonathan James
- Cameron Lacroix
- List of hackers
- Lords of Dharmaraja
- MAC spoofing
- Abbassa Malik
- Man-in-the-browser
- Market for zero-day exploits
- Metropolitan Police role in the news media phone hacking scandal
- Milw0rm
- Hector Monsegur
- Dennis L. Montgomery
- Network Behavior Anomaly Detection
- Network detector
- Network enumeration
- News International phone hacking scandal
- News media phone hacking scandal reference lists
- Phone hacking
- Null session
- Rafael Núñez (hacker)
- Offensive Security Certified Professional
- Operation AntiSec
- Operation High Roller
- Sarah Palin email hack
- Pass the hash
- Patriotic hacking
- Peg DHCP
- PLA Unit 61398
- Relay attack
- RF monitor software
- Robin Sage
- Rogue system
- Script kiddie
- The Secret History of Hacking
- Roman Seleznev
- South African hacker history
- Stakkato
- Systempunkt
- Telehack
- Tiger team
- Tiger Team (TV series)
- Timeline of computer security hacker history
- Topiary (hacktivist)
- United States v. Ancheta
- Vulcanbot
- Vulnerability (computing)
- Wargame (hacking)
- Website defacement
- White hat (computer security)
- Windows Master Control Panel shortcut
- Zone-H
- Disk image
- Gold Coast Techspace
- Hackers: Wizards of the Electronic Age
- Hackerspace
- Hacking of consumer electronics
- IOS jailbreaking
- Life hacking
- Media Descriptor File
- OBDuino
- Open-source computing hardware
- List of open-source hardware projects
- Proto BuildBar
- ROM hacking
- SAPO Codebits
- Smart cow problem
- Software cracking
- Undubbing
- Xinchejian
- Portal:Computer security
- California S.B. 1386
- Cybercrime Prevention Act of 2012
- DADVSI
- Data Protection Act 1998
- Digital Economy Act 2010
- Geolocation Privacy and Surveillance Act
- HADOPI law
- Information Technology Act, 2000
- Ley Sinde
- Louisiana Software License Enforcement Act
- Police and Justice Act 2006
- Protecting Children from Internet Predators Act
- Regulation of Investigatory Powers Act 2000
- Russian Internet Restriction Bill
- Spam Act 2003
- Uniform Computer Information Transactions Act
- Uniform Electronic Transactions Act
- Legal aspects of computing
- Affero General Public License
- Browse wrap
- Caselex
- CeCILL
- Center for Copyright Information
- Child Protection Registry Acts
- Clean room design
- Clickwrap
- Community Broadband Bill
- Computational law
- Computer and Internet Protocol Address Verifier
- Computer trespass
- Contributor License Agreement
- CONTU
- Copyright Alert System
- Copyright aspects of hyperlinking and framing
- Legal aspects of file sharing
- Creative Commons jurisdiction ports
- Creative Commons license
- Creative Commons-licensed content directories
- Crypto-anarchism
- Cyber defamation law
- Cyberstalking legislation
- Cyprus Safer Internet Hotline
- Data discrimination
- Data haven
- Deep linking
- Digital commons (economics)
- Digital evidence
- Digital inheritance
- Digital signatures and law
- Decentralized autonomous organization
- ElcomSoft
- Electronic Commerce Protection Act
- Electronic signature
- Email spam legislation by country
- End-user license agreement
- Eolas
- ESign (India)
- European Union Public Licence
- Export of cryptography
- Export of cryptography from the United States
- Free license
- GNU General Public License
- GNU Lesser General Public License
- GPL font exception
- GPL linking exception
- Gpl-violations.org
- Illegal prime
- Information privacy law
- Legal issues with BitTorrent
- Internet as a source of prior art
- Internet taxes
- Law of the Horse
- Limitations on exclusive rights: Computer programs
- Magic Lantern (software)
- Motion Picture Association of America
- Net neutrality in the Netherlands
- Net neutrality law
- Newzbin
- Barbara Nitke
- Notice and take down
- Notorious markets
- Open Music Model
- Open source
- Open Source Observatory and Repository
- Payment Card Industry Data Security Standard
- Permissive free software licence
- Personal jurisdiction over international defendants in the United States
- Magna Carta for Philippine Internet Freedom
- Legality of piggybacking
- Platform for Internet Content Selection
- Policies promoting wireless broadband in the United States
- Proprietary software
- Protected computer
- Return merchandise authorization
- Scientology and the Internet
- Principality of Sealand
- Search neutrality
- Security breach notification laws
- SecurityMetrics
- Suzanne Shell
- Shrink wrap contract
- Smart contract
- Software law
- Source code escrow
- Structure, sequence and organization
- Taxation of digital goods
- Title 21 CFR Part 11
- US State Laws and Policies for ICT Accessibility
- Warrant canary
- Bernstein v. United States
- Chamberlain Group, Inc. v. Skylink Technologies, Inc.
- Cryptography law
- DeCSS
- Digital rights management
- ECC patents
- Electronic Communications Act 2000
- Electronic Signatures in Global and National Commerce Act
- Government Paperwork Elimination Act
- Illegal number
- In re Boucher
- Junger v. Daley
- Peter Junger
- Key disclosure law
- Massachusetts Bay Transportation Authority v. Anderson
- Microsystems Software, Inc. v. Scandinavia Online AB
- Penet remailer
- Qrpff
- RealNetworks, Inc. v. DVD Copy Control Ass'n, Inc.
- Texas Instruments signing key controversy
- United States v. Fricosu
- Universal City Studios, Inc. v. Reimerdes
- 2013 International child pornography investigation
- Additional Protocol to the Convention on Cybercrime
- APT29
- Avalanche (phishing group)
- Art Bowker
- Brandjacking
- Bulletproof hosting
- Cybercrime in Canada
- Carder.su
- Carding (fraud)
- Cellphone surveillance
- Computer security
- Convention on Cybercrime
- Counterfeit medicines online
- Crime forum
- Cyber Crime Unit (Hellenic Police)
- Cyber Intelligence Sharing and Protection Act
- Cyber Threat Intelligence Integration Center
- Cyberbullying
- Cybercrime
- Cybercrime countermeasures
- Cyberextortion
- Cyberextortionist
- Cyberheist
- Cybersecurity Information Sharing Act
- Cyberstalking
- Cyberterrorism
- Dark web
- Dark0de
- DarkMarket
- Domain hijacking
- Domain name scams
- Doppelganger domain
- Four Horsemen of the Infocalypse
- HackBB
- H*Commerce: The Business of Hacking You
- Hell (forum)
- High Technology Crime Investigation Association
- Ilbe Storehouse
- International cybercrime
- Internet and terrorism
- Internet homicide
- Keystroke logging
- Kingpin (book)
- Mazafaka (hacker group)
- McColo
- Gary McKinnon
- MediaDefender
- Minecode
- MPack (software)
- Murder of Ofir Rahum
- Murder of Troy LaFerrara
- National Cyber Crime Unit
- Omega Engineering
- Online predator
- Operation Cybersnare
- Operation Delego
- Operation Onymous
- Operation Payback
- Operation Protect Our Children
- Operation Shrouded Horizon
- Operation Tovar
- Pakbugs
- Password cracking
- People v. Marquan M.
- Phishing
- PhishTank
- Political repression of cyber-dissidents
- Pranknet
- Protecting Canadians from Online Crime Act
- Rescator
- Reverse domain hijacking
- Russian Business Network
- Santrex
- Scareware
- Sextortion
- ShadowCrew
- SMS spoofing
- Snarfing
- Social engineering (security)
- Spamming
- Stop Cyberbullying Day
- Tabnabbing
- Tatort Internet
- Technical support scam
- TheRealDeal
- Tor Carding Forum
- The Truth about Truman School
- Typosquatting
- VANK
- David S. Wall
- Website correlation
- Wifiphisher
- Youth Internet Safety Survey
- Anticybersquatting Consumer Protection Act
- Child Online Protection Act
- Children's Internet Protection Act
- Children's Online Privacy Protection Act
- Combating Online Infringement and Counterfeits Act
- Communications Decency Act
- Computer Security Act of 1987
- Deleting Online Predators Act of 2006
- Digital Millennium Copyright Act
- Digital Signature and Electronic Authentication Law
- E-Government Act of 2002
- Federal Information Security Management Act of 2002
- Gramm–Leach–Bliley Act
- High Performance Computing Act of 1991
- Internet Freedom and Nondiscrimination Act of 2006
- Internet Radio Equality Act
- List of organizations with official stances on the SOPA and PIPA
- List of US Congresspersons who support or oppose SOPA/PIPA
- National Information Infrastructure Protection Act
- Networking and Information Technology Research and Development
- No Electronic Theft Act
- Online Copyright Infringement Liability Limitation Act
- Online Privacy Protection Act
- Online Protection and Enforcement of Digital Trade Act
- Operation In Our Sites
- PROTECT IP Act
- Protecting Children from Internet Pornographers Act of 2011
- Section 230 of the Communications Decency Act
- Stop Online Piracy Act
- Unlocking Consumer Choice and Wireless Competition Act