User:Mcblack1/Books/Computing Legislation

Computing Fraud and Legislation

 * CAN-SPAM Act of 2003
 * Computer Fraud and Abuse Act
 * Comprehensive Crime Control Act of 1984
 * Patriot Act
 * Racketeer Influenced and Corrupt Organizations Act
 * Espionage Act of 1917
 * Stored Communications Act
 * United States v. Drew
 * Electronic Communications Privacy Act
 * California Comprehensive Computer Data Access and Fraud Act
 * Defense Secrets Act of 1911
 * McCarran Internal Security Act
 * Computer fraud
 * Information technology security audit
 * Hacker (computer security)
 * 1984 Network Liberty Alliance
 * 2012 LinkedIn hack
 * 2012 Yahoo! Voices hack
 * Advanced persistent threat
 * Antisec Movement
 * AOHell
 * Attack patterns
 * Itzhak "Zuk" Avraham
 * Mustafa Al-Bassam
 * BBS: The Documentary
 * Black hat
 * Loyd Blankenship
 * Bluebugging
 * BlueHat
 * Bluesnarfing
 * Elie Bursztein
 * Camfecting
 * Certified Ethical Hacker
 * Clickjacking
 * Climatic Research Unit documents
 * List of computer criminals
 * Computer Misuse Act 1990
 * Content Security Policy
 * Cookiejacking
 * Cracking of wireless networks
 * Cross-site scripting
 * The Cuckoo's Egg
 * Cyber ShockWave
 * Cyber spying
 * Cyber-arms industry
 * Cyber-collection
 * Cyberstrategy 3.0
 * Cyberwarfare
 * Cyberwarfare in the United States
 * Decocidio
 * DNS hijacking
 * DNS spoofing
 * DNSChanger
 * Daniel Domscheit-Berg
 * Doxing
 * Fabien Duchene
 * ELearnSecurity
 * Email hacking
 * Fake AP
 * File binder
 * Firesheep
 * Form grabbing
 * Frame injection
 * Fully undetectable
 * Albert Gonzalez
 * Great Cannon
 * Great Hacker War
 * Grey hat
 * Network Crack Program Hacker Group
 * Hacker (term)
 * Hacker Manifesto
 * The Hacker Wars
 * The Hacker's Handbook
 * Hackers Are People Too
 * Hackers in Wonderland
 * Hackers Wanted
 * Cyberwarfare in China
 * Hacking tool
 * HackThisSite
 * Hacktivism
 * Markus Hess
 * High-Tech Bridge
 * Junaid Hussain
 * ISP redirect page
 * Jonathan James
 * Cameron Lacroix
 * List of hackers
 * Lords of Dharmaraja
 * MAC spoofing
 * Abbassa Malik
 * Man-in-the-browser
 * Market for zero-day exploits
 * Metropolitan Police role in the news media phone hacking scandal
 * Milw0rm
 * Hector Monsegur
 * Dennis L. Montgomery
 * Network Behavior Anomaly Detection
 * Network detector
 * Network enumeration
 * News International phone hacking scandal
 * News media phone hacking scandal reference lists
 * Phone hacking
 * Null session
 * Rafael Núñez (hacker)
 * Offensive Security Certified Professional
 * Operation AntiSec
 * Operation High Roller
 * Sarah Palin email hack
 * Pass the hash
 * Patriotic hacking
 * Peg DHCP
 * PLA Unit 61398
 * Relay attack
 * RF monitor software
 * Robin Sage
 * Rogue system
 * Script kiddie
 * The Secret History of Hacking
 * Roman Seleznev
 * South African hacker history
 * Stakkato
 * Systempunkt
 * Telehack
 * Tiger team
 * Tiger Team (TV series)
 * Timeline of computer security hacker history
 * Topiary (hacktivist)
 * United States v. Ancheta
 * Vulcanbot
 * Vulnerability (computing)
 * Wargame (hacking)
 * Website defacement
 * White hat (computer security)
 * Windows Master Control Panel shortcut
 * Zone-H
 * Disk image
 * Gold Coast Techspace
 * Hackers: Wizards of the Electronic Age
 * Hackerspace
 * Hacking of consumer electronics
 * IOS jailbreaking
 * Life hacking
 * Media Descriptor File
 * OBDuino
 * Open-source computing hardware
 * List of open-source hardware projects
 * Proto BuildBar
 * ROM hacking
 * SAPO Codebits
 * Smart cow problem
 * Software cracking
 * Undubbing
 * Xinchejian
 * Portal:Computer security
 * California S.B. 1386
 * Cybercrime Prevention Act of 2012
 * DADVSI
 * Data Protection Act 1998
 * Digital Economy Act 2010
 * Geolocation Privacy and Surveillance Act
 * HADOPI law
 * Information Technology Act, 2000
 * Ley Sinde
 * Louisiana Software License Enforcement Act
 * Police and Justice Act 2006
 * Protecting Children from Internet Predators Act
 * Regulation of Investigatory Powers Act 2000
 * Russian Internet Restriction Bill
 * Spam Act 2003
 * Uniform Computer Information Transactions Act
 * Uniform Electronic Transactions Act
 * Legal aspects of computing
 * Affero General Public License
 * Browse wrap
 * Caselex
 * CeCILL
 * Center for Copyright Information
 * Child Protection Registry Acts
 * Clean room design
 * Clickwrap
 * Community Broadband Bill
 * Computational law
 * Computer and Internet Protocol Address Verifier
 * Computer trespass
 * Contributor License Agreement
 * CONTU
 * Copyright Alert System
 * Copyright aspects of hyperlinking and framing
 * Legal aspects of file sharing
 * Creative Commons jurisdiction ports
 * Creative Commons license
 * Creative Commons-licensed content directories
 * Crypto-anarchism
 * Cyber defamation law
 * Cyberstalking legislation
 * Cyprus Safer Internet Hotline
 * Data discrimination
 * Data haven
 * Deep linking
 * Digital commons (economics)
 * Digital evidence
 * Digital inheritance
 * Digital signatures and law
 * Decentralized autonomous organization
 * ElcomSoft
 * Electronic Commerce Protection Act
 * Electronic signature
 * Email spam legislation by country
 * End-user license agreement
 * Eolas
 * ESign (India)
 * European Union Public Licence
 * Export of cryptography
 * Export of cryptography from the United States
 * Free license
 * GNU General Public License
 * GNU Lesser General Public License
 * GPL font exception
 * GPL linking exception
 * Gpl-violations.org
 * Illegal prime
 * Information privacy law
 * Legal issues with BitTorrent
 * Internet as a source of prior art
 * Internet taxes
 * Law of the Horse
 * Limitations on exclusive rights: Computer programs
 * Magic Lantern (software)
 * Motion Picture Association of America
 * Net neutrality in the Netherlands
 * Net neutrality law
 * Newzbin
 * Barbara Nitke
 * Notice and take down
 * Notorious markets
 * Open Music Model
 * Open source
 * Open Source Observatory and Repository
 * Payment Card Industry Data Security Standard
 * Permissive free software licence
 * Personal jurisdiction over international defendants in the United States
 * Magna Carta for Philippine Internet Freedom
 * Legality of piggybacking
 * Platform for Internet Content Selection
 * Policies promoting wireless broadband in the United States
 * Proprietary software
 * Protected computer
 * Return merchandise authorization
 * Scientology and the Internet
 * Principality of Sealand
 * Search neutrality
 * Security breach notification laws
 * SecurityMetrics
 * Suzanne Shell
 * Shrink wrap contract
 * Smart contract
 * Software law
 * Source code escrow
 * Structure, sequence and organization
 * Taxation of digital goods
 * Title 21 CFR Part 11
 * US State Laws and Policies for ICT Accessibility
 * Warrant canary
 * Bernstein v. United States
 * Chamberlain Group, Inc. v. Skylink Technologies, Inc.
 * Cryptography law
 * DeCSS
 * Digital rights management
 * ECC patents
 * Electronic Communications Act 2000
 * Electronic Signatures in Global and National Commerce Act
 * Government Paperwork Elimination Act
 * Illegal number
 * In re Boucher
 * Junger v. Daley
 * Peter Junger
 * Key disclosure law
 * Massachusetts Bay Transportation Authority v. Anderson
 * Microsystems Software, Inc. v. Scandinavia Online AB
 * Penet remailer
 * Qrpff
 * RealNetworks, Inc. v. DVD Copy Control Ass'n, Inc.
 * Texas Instruments signing key controversy
 * United States v. Fricosu
 * Universal City Studios, Inc. v. Reimerdes
 * 2013 International child pornography investigation
 * Additional Protocol to the Convention on Cybercrime
 * APT29
 * Avalanche (phishing group)
 * Art Bowker
 * Brandjacking
 * Bulletproof hosting
 * Cybercrime in Canada
 * Carder.su
 * Carding (fraud)
 * Cellphone surveillance
 * Computer security
 * Convention on Cybercrime
 * Counterfeit medicines online
 * Crime forum
 * Cyber Crime Unit (Hellenic Police)
 * Cyber Intelligence Sharing and Protection Act
 * Cyber Threat Intelligence Integration Center
 * Cyberbullying
 * Cybercrime
 * Cybercrime countermeasures
 * Cyberextortion
 * Cyberextortionist
 * Cyberheist
 * Cybersecurity Information Sharing Act
 * Cyberstalking
 * Cyberterrorism
 * Dark web
 * Dark0de
 * DarkMarket
 * Domain hijacking
 * Domain name scams
 * Doppelganger domain
 * Four Horsemen of the Infocalypse
 * HackBB
 * H*Commerce: The Business of Hacking You
 * Hell (forum)
 * High Technology Crime Investigation Association
 * Ilbe Storehouse
 * International cybercrime
 * Internet and terrorism
 * Internet homicide
 * Keystroke logging
 * Kingpin (book)
 * Mazafaka (hacker group)
 * McColo
 * Gary McKinnon
 * MediaDefender
 * Minecode
 * MPack (software)
 * Murder of Ofir Rahum
 * Murder of Troy LaFerrara
 * National Cyber Crime Unit
 * Omega Engineering
 * Online predator
 * Operation Cybersnare
 * Operation Delego
 * Operation Onymous
 * Operation Payback
 * Operation Protect Our Children
 * Operation Shrouded Horizon
 * Operation Tovar
 * Pakbugs
 * Password cracking
 * People v. Marquan M.
 * Phishing
 * PhishTank
 * Political repression of cyber-dissidents
 * Pranknet
 * Protecting Canadians from Online Crime Act
 * Rescator
 * Reverse domain hijacking
 * Russian Business Network
 * Santrex
 * Scareware
 * Sextortion
 * ShadowCrew
 * SMS spoofing
 * Snarfing
 * Social engineering (security)
 * Spamming
 * Stop Cyberbullying Day
 * Tabnabbing
 * Tatort Internet
 * Technical support scam
 * TheRealDeal
 * Tor Carding Forum
 * The Truth about Truman School
 * Typosquatting
 * VANK
 * David S. Wall
 * Website correlation
 * Wifiphisher
 * Youth Internet Safety Survey
 * Anticybersquatting Consumer Protection Act
 * Child Online Protection Act
 * Children's Internet Protection Act
 * Children's Online Privacy Protection Act
 * Combating Online Infringement and Counterfeits Act
 * Communications Decency Act
 * Computer Security Act of 1987
 * Deleting Online Predators Act of 2006
 * Digital Millennium Copyright Act
 * Digital Signature and Electronic Authentication Law
 * E-Government Act of 2002
 * Federal Information Security Management Act of 2002
 * Gramm–Leach–Bliley Act
 * High Performance Computing Act of 1991
 * Internet Freedom and Nondiscrimination Act of 2006
 * Internet Radio Equality Act
 * List of organizations with official stances on the SOPA and PIPA
 * List of US Congresspersons who support or oppose SOPA/PIPA
 * National Information Infrastructure Protection Act
 * Networking and Information Technology Research and Development
 * No Electronic Theft Act
 * Online Copyright Infringement Liability Limitation Act
 * Online Privacy Protection Act
 * Online Protection and Enforcement of Digital Trade Act
 * Operation In Our Sites
 * PROTECT IP Act
 * Protecting Children from Internet Pornographers Act of 2011
 * Section 230 of the Communications Decency Act
 * Stop Online Piracy Act
 * Unlocking Consumer Choice and Wireless Competition Act