User:Mcblack1/Books/Computing Legislation

    From Wikipedia, the free encyclopedia


    Computing Fraud and Legislation[edit]

    CAN-SPAM Act of 2003
    Computer Fraud and Abuse Act
    Comprehensive Crime Control Act of 1984
    Patriot Act
    Racketeer Influenced and Corrupt Organizations Act
    Espionage Act of 1917
    Stored Communications Act
    United States v. Drew
    Electronic Communications Privacy Act
    California Comprehensive Computer Data Access and Fraud Act
    Defense Secrets Act of 1911
    McCarran Internal Security Act
    Computer fraud
    Information technology security audit
    Hacker (computer security)
    1984 Network Liberty Alliance
    2012 LinkedIn hack
    2012 Yahoo! Voices hack
    Advanced persistent threat
    Antisec Movement
    AOHell
    Attack patterns
    Itzhak "Zuk" Avraham
    Mustafa Al-Bassam
    BBS: The Documentary
    Black hat
    Loyd Blankenship
    Bluebugging
    BlueHat
    Bluesnarfing
    Elie Bursztein
    Camfecting
    Certified Ethical Hacker
    Clickjacking
    Climatic Research Unit documents
    List of computer criminals
    Computer Misuse Act 1990
    Content Security Policy
    Cookiejacking
    Cracking of wireless networks
    Cross-site scripting
    The Cuckoo's Egg
    Cyber ShockWave
    Cyber spying
    Cyber-arms industry
    Cyber-collection
    Cyberstrategy 3.0
    Cyberwarfare
    Cyberwarfare in the United States
    Decocidio
    DNS hijacking
    DNS spoofing
    DNSChanger
    Daniel Domscheit-Berg
    Doxing
    Fabien Duchene
    ELearnSecurity
    Email hacking
    Fake AP
    File binder
    Firesheep
    Form grabbing
    Frame injection
    Fully undetectable
    Albert Gonzalez
    Great Cannon
    Great Hacker War
    Grey hat
    Network Crack Program Hacker Group
    Hacker (term)
    Hacker Manifesto
    The Hacker Wars
    The Hacker's Handbook
    Hackers Are People Too
    Hackers in Wonderland
    Hackers Wanted
    Cyberwarfare in China
    Hacking tool
    HackThisSite
    Hacktivism
    Markus Hess
    High-Tech Bridge
    Junaid Hussain
    ISP redirect page
    Jonathan James
    Cameron Lacroix
    List of hackers
    Lords of Dharmaraja
    MAC spoofing
    Abbassa Malik
    Man-in-the-browser
    Market for zero-day exploits
    Metropolitan Police role in the news media phone hacking scandal
    Milw0rm
    Hector Monsegur
    Dennis L. Montgomery
    Network Behavior Anomaly Detection
    Network detector
    Network enumeration
    News International phone hacking scandal
    News media phone hacking scandal reference lists
    Phone hacking
    Null session
    Rafael Núñez (hacker)
    Offensive Security Certified Professional
    Operation AntiSec
    Operation High Roller
    Sarah Palin email hack
    Pass the hash
    Patriotic hacking
    Peg DHCP
    PLA Unit 61398
    Relay attack
    RF monitor software
    Robin Sage
    Rogue system
    Script kiddie
    The Secret History of Hacking
    Roman Seleznev
    South African hacker history
    Stakkato
    Systempunkt
    Telehack
    Tiger team
    Tiger Team (TV series)
    Timeline of computer security hacker history
    Topiary (hacktivist)
    United States v. Ancheta
    Vulcanbot
    Vulnerability (computing)
    Wargame (hacking)
    Website defacement
    White hat (computer security)
    Windows Master Control Panel shortcut
    Zone-H
    Disk image
    Gold Coast Techspace
    Hackers: Wizards of the Electronic Age
    Hackerspace
    Hacking of consumer electronics
    IOS jailbreaking
    Life hacking
    Media Descriptor File
    OBDuino
    Open-source computing hardware
    List of open-source hardware projects
    Proto BuildBar
    ROM hacking
    SAPO Codebits
    Smart cow problem
    Software cracking
    Undubbing
    Xinchejian
    Portal:Computer security
    California S.B. 1386
    Cybercrime Prevention Act of 2012
    DADVSI
    Data Protection Act 1998
    Digital Economy Act 2010
    Geolocation Privacy and Surveillance Act
    HADOPI law
    Information Technology Act, 2000
    Ley Sinde
    Louisiana Software License Enforcement Act
    Police and Justice Act 2006
    Protecting Children from Internet Predators Act
    Regulation of Investigatory Powers Act 2000
    Russian Internet Restriction Bill
    Spam Act 2003
    Uniform Computer Information Transactions Act
    Uniform Electronic Transactions Act
    Legal aspects of computing
    Affero General Public License
    Browse wrap
    Caselex
    CeCILL
    Center for Copyright Information
    Child Protection Registry Acts
    Clean room design
    Clickwrap
    Community Broadband Bill
    Computational law
    Computer and Internet Protocol Address Verifier
    Computer trespass
    Contributor License Agreement
    CONTU
    Copyright Alert System
    Copyright aspects of hyperlinking and framing
    Legal aspects of file sharing
    Creative Commons jurisdiction ports
    Creative Commons license
    Creative Commons-licensed content directories
    Crypto-anarchism
    Cyber defamation law
    Cyberstalking legislation
    Cyprus Safer Internet Hotline
    Data discrimination
    Data haven
    Deep linking
    Digital commons (economics)
    Digital evidence
    Digital inheritance
    Digital signatures and law
    Decentralized autonomous organization
    ElcomSoft
    Electronic Commerce Protection Act
    Electronic signature
    Email spam legislation by country
    End-user license agreement
    Eolas
    ESign (India)
    European Union Public Licence
    Export of cryptography
    Export of cryptography from the United States
    Free license
    GNU General Public License
    GNU Lesser General Public License
    GPL font exception
    GPL linking exception
    Gpl-violations.org
    Illegal prime
    Information privacy law
    Legal issues with BitTorrent
    Internet as a source of prior art
    Internet taxes
    Law of the Horse
    Limitations on exclusive rights: Computer programs
    Magic Lantern (software)
    Motion Picture Association of America
    Net neutrality in the Netherlands
    Net neutrality law
    Newzbin
    Barbara Nitke
    Notice and take down
    Notorious markets
    Open Music Model
    Open source
    Open Source Observatory and Repository
    Payment Card Industry Data Security Standard
    Permissive free software licence
    Personal jurisdiction over international defendants in the United States
    Magna Carta for Philippine Internet Freedom
    Legality of piggybacking
    Platform for Internet Content Selection
    Policies promoting wireless broadband in the United States
    Proprietary software
    Protected computer
    Return merchandise authorization
    Scientology and the Internet
    Principality of Sealand
    Search neutrality
    Security breach notification laws
    SecurityMetrics
    Suzanne Shell
    Shrink wrap contract
    Smart contract
    Software law
    Source code escrow
    Structure, sequence and organization
    Taxation of digital goods
    Title 21 CFR Part 11
    US State Laws and Policies for ICT Accessibility
    Warrant canary
    Bernstein v. United States
    Chamberlain Group, Inc. v. Skylink Technologies, Inc.
    Cryptography law
    DeCSS
    Digital rights management
    ECC patents
    Electronic Communications Act 2000
    Electronic Signatures in Global and National Commerce Act
    Government Paperwork Elimination Act
    Illegal number
    In re Boucher
    Junger v. Daley
    Peter Junger
    Key disclosure law
    Massachusetts Bay Transportation Authority v. Anderson
    Microsystems Software, Inc. v. Scandinavia Online AB
    Penet remailer
    Qrpff
    RealNetworks, Inc. v. DVD Copy Control Ass'n, Inc.
    Texas Instruments signing key controversy
    United States v. Fricosu
    Universal City Studios, Inc. v. Reimerdes
    2013 International child pornography investigation
    Additional Protocol to the Convention on Cybercrime
    APT29
    Avalanche (phishing group)
    Art Bowker
    Brandjacking
    Bulletproof hosting
    Cybercrime in Canada
    Carder.su
    Carding (fraud)
    Cellphone surveillance
    Computer security
    Convention on Cybercrime
    Counterfeit medicines online
    Crime forum
    Cyber Crime Unit (Hellenic Police)
    Cyber Intelligence Sharing and Protection Act
    Cyber Threat Intelligence Integration Center
    Cyberbullying
    Cybercrime
    Cybercrime countermeasures
    Cyberextortion
    Cyberextortionist
    Cyberheist
    Cybersecurity Information Sharing Act
    Cyberstalking
    Cyberterrorism
    Dark web
    Dark0de
    DarkMarket
    Domain hijacking
    Domain name scams
    Doppelganger domain
    Four Horsemen of the Infocalypse
    HackBB
    H*Commerce: The Business of Hacking You
    Hell (forum)
    High Technology Crime Investigation Association
    Ilbe Storehouse
    International cybercrime
    Internet and terrorism
    Internet homicide
    Keystroke logging
    Kingpin (book)
    Mazafaka (hacker group)
    McColo
    Gary McKinnon
    MediaDefender
    Minecode
    MPack (software)
    Murder of Ofir Rahum
    Murder of Troy LaFerrara
    National Cyber Crime Unit
    Omega Engineering
    Online predator
    Operation Cybersnare
    Operation Delego
    Operation Onymous
    Operation Payback
    Operation Protect Our Children
    Operation Shrouded Horizon
    Operation Tovar
    Pakbugs
    Password cracking
    People v. Marquan M.
    Phishing
    PhishTank
    Political repression of cyber-dissidents
    Pranknet
    Protecting Canadians from Online Crime Act
    Rescator
    Reverse domain hijacking
    Russian Business Network
    Santrex
    Scareware
    Sextortion
    ShadowCrew
    SMS spoofing
    Snarfing
    Social engineering (security)
    Spamming
    Stop Cyberbullying Day
    Tabnabbing
    Tatort Internet
    Technical support scam
    TheRealDeal
    Tor Carding Forum
    The Truth about Truman School
    Typosquatting
    VANK
    David S. Wall
    Website correlation
    Wifiphisher
    Youth Internet Safety Survey
    Anticybersquatting Consumer Protection Act
    Child Online Protection Act
    Children's Internet Protection Act
    Children's Online Privacy Protection Act
    Combating Online Infringement and Counterfeits Act
    Communications Decency Act
    Computer Security Act of 1987
    Deleting Online Predators Act of 2006
    Digital Millennium Copyright Act
    Digital Signature and Electronic Authentication Law
    E-Government Act of 2002
    Federal Information Security Management Act of 2002
    Gramm–Leach–Bliley Act
    High Performance Computing Act of 1991
    Internet Freedom and Nondiscrimination Act of 2006
    Internet Radio Equality Act
    List of organizations with official stances on the SOPA and PIPA
    List of US Congresspersons who support or oppose SOPA/PIPA
    National Information Infrastructure Protection Act
    Networking and Information Technology Research and Development
    No Electronic Theft Act
    Online Copyright Infringement Liability Limitation Act
    Online Privacy Protection Act
    Online Protection and Enforcement of Digital Trade Act
    Operation In Our Sites
    PROTECT IP Act
    Protecting Children from Internet Pornographers Act of 2011
    Section 230 of the Communications Decency Act
    Stop Online Piracy Act
    Unlocking Consumer Choice and Wireless Competition Act