Industry of anonymity : inside the business of cybercrime / Jonathan Lusthaus.

Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he...

Full description

Bibliographic Details
Main Author: Lusthaus, Jonathan, 1984- (Author)
Language:English
Published: Cambridge, Massachusetts : Harvard University Press, 2018.
Subjects:
Physical Description:289 pages ; 25 cm
Format: Book

MARC

LEADER 00000cam a2200000 i 4500
001 in00005894969
003 OCoLC
005 20220616025508.0
008 180312t20182018maua b 001 0 eng c
010 |a  2018009362 
020 |a 9780674979413  |q hardcover  |q alkaline paper 
020 |a 0674979419  |q hardcover  |q alkaline paper 
035 |a (OCoLC)1023093342 
040 |a MH/DLC  |b eng  |e rda  |c DLC  |d OCLCO  |d BDX  |d OCLCF  |d ERASA  |d YDX  |d OCLCO  |d UtOrBLW 
042 |a pcc 
049 |a EEMR 
050 0 0 |a HV6773  |b .L87 2018 
082 0 0 |a 364.16/8  |2 23 
100 1 |a Lusthaus, Jonathan,  |d 1984-  |e author.  |0 http://id.loc.gov/authorities/names/no2018044818 
245 1 0 |a Industry of anonymity :  |b inside the business of cybercrime /  |c Jonathan Lusthaus. 
264 1 |a Cambridge, Massachusetts :  |b Harvard University Press,  |c 2018. 
264 4 |c ©2018 
300 |a 289 pages ;  |c 25 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a From lone wolves to industrialization -- Making sense of the cybercrime industry -- Nicknames and identity -- How cybercriminals cooperate online -- The offline dimension -- Cybercrime, organized crime, and governance. 
520 |a Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.--  |c Provided by publisher. 
650 0 |a Computer crimes.  |0 http://id.loc.gov/authorities/subjects/sh85029492 
650 0 |a Hackers.  |0 http://id.loc.gov/authorities/subjects/sh94005931 
650 0 |a Online identities.  |0 http://id.loc.gov/authorities/subjects/sh2006002330 
650 0 |a Organized crime.  |0 http://id.loc.gov/authorities/subjects/sh85095528 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
650 7 |a Online identities.  |2 fast  |0 (OCoLC)fst01740515 
650 7 |a Organized crime.  |2 fast  |0 (OCoLC)fst01047884 
907 |y .b129042432  |b 181105  |c 181005 
998 |a mn  |b 181011  |c m  |d a   |e -  |f eng  |g mau  |h 0  |i 2 
994 |a 92  |b EEM 
999 f f |i 56e2a334-9128-5682-b573-fc9a4679faee  |s d79463bb-2c22-5004-924a-3e78c5a7f111  |t 0 
952 f f |p Can Circulate  |a Michigan State University-Library of Michigan  |b Michigan State University  |c MSU Main Library  |d MSU Main Library  |t 0  |e HV6773 .L87 2018  |h Library of Congress classification  |i Printed Material  |m 31293036106304  |n 1