Includes bibliographical references (pages 389-395) and index.
Contents
An attack on the telephone network -- An attack on an ISP -- If he had just paid the rent -- Inside a hacker sting operation ... -- Identity theft -- Let's ask the hackers ... -- Why do hackers hack? -- Setting the stage -- High-tech crime -- What not to do -- How to run a high-tech case -- What have we learned.