User:Mcblack1/Books/Computing Legislation

Source: Wikipedia, the free encyclopedia.


Computing Fraud and Legislation

CAN-SPAM Act of 2003
Computer Fraud and Abuse Act
Comprehensive Crime Control Act of 1984
Patriot Act
Racketeer Influenced and Corrupt Organizations Act
Espionage Act of 1917
Stored Communications Act
United States v. Drew
Electronic Communications Privacy Act
California Comprehensive Computer Data Access and Fraud Act
Defense Secrets Act of 1911
McCarran Internal Security Act
Computer fraud
Information technology security audit
Hacker (computer security)
1984 Network Liberty Alliance
2012 LinkedIn hack
2012 Yahoo! Voices hack
Advanced persistent threat
Antisec Movement
AOHell
Attack patterns
Itzhak "Zuk" Avraham
Mustafa Al-Bassam
BBS: The Documentary
Black hat
Loyd Blankenship
Bluebugging
BlueHat
Bluesnarfing
Elie Bursztein
Camfecting
Certified Ethical Hacker
Clickjacking
Climatic Research Unit documents
List of computer criminals
Computer Misuse Act 1990
Content Security Policy
Cookiejacking
Cracking of wireless networks
Cross-site scripting
The Cuckoo's Egg
Cyber ShockWave
Cyber spying
Cyber-arms industry
Cyber-collection
Cyberstrategy 3.0
Cyberwarfare
Cyberwarfare in the United States
Decocidio
DNS hijacking
DNS spoofing
DNSChanger
Daniel Domscheit-Berg
Doxing
Fabien Duchene
ELearnSecurity
Email hacking
Fake AP
File binder
Firesheep
Form grabbing
Frame injection
Fully undetectable
Albert Gonzalez
Great Cannon
Great Hacker War
Grey hat
Network Crack Program Hacker Group
Hacker (term)
Hacker Manifesto
The Hacker Wars
The Hacker's Handbook
Hackers Are People Too
Hackers in Wonderland
Hackers Wanted
Cyberwarfare in China
Hacking tool
HackThisSite
Hacktivism
Markus Hess
High-Tech Bridge
Junaid Hussain
ISP redirect page
Jonathan James
Cameron Lacroix
List of hackers
Lords of Dharmaraja
MAC spoofing
Abbassa Malik
Man-in-the-browser
Market for zero-day exploits
Metropolitan Police role in the news media phone hacking scandal
Milw0rm
Hector Monsegur
Dennis L. Montgomery
Network Behavior Anomaly Detection
Network detector
Network enumeration
News International phone hacking scandal
News media phone hacking scandal reference lists
Phone hacking
Null session
Rafael Núñez (hacker)
Offensive Security Certified Professional
Operation AntiSec
Operation High Roller
Sarah Palin email hack
Pass the hash
Patriotic hacking
Peg DHCP
PLA Unit 61398
Relay attack
RF monitor software
Robin Sage
Rogue system
Script kiddie
The Secret History of Hacking
Roman Seleznev
South African hacker history
Stakkato
Systempunkt
Telehack
Tiger team
Tiger Team (TV series)
Timeline of computer security hacker history
Topiary (hacktivist)
United States v. Ancheta
Vulcanbot
Vulnerability (computing)
Wargame (hacking)
Website defacement
White hat (computer security)
Windows Master Control Panel shortcut
Zone-H
Disk image
Gold Coast Techspace
Hackers: Wizards of the Electronic Age
Hackerspace
Hacking of consumer electronics
IOS jailbreaking
Life hacking
Media Descriptor File
OBDuino
Open-source computing hardware
List of open-source hardware projects
Proto BuildBar
ROM hacking
SAPO Codebits
Smart cow problem
Software cracking
Undubbing
Xinchejian
Portal:Computer security
California S.B. 1386
Cybercrime Prevention Act of 2012
DADVSI
Data Protection Act 1998
Digital Economy Act 2010
Geolocation Privacy and Surveillance Act
HADOPI law
Information Technology Act, 2000
Ley Sinde
Louisiana Software License Enforcement Act
Police and Justice Act 2006
Protecting Children from Internet Predators Act
Regulation of Investigatory Powers Act 2000
Russian Internet Restriction Bill
Spam Act 2003
Uniform Computer Information Transactions Act
Uniform Electronic Transactions Act
Legal aspects of computing
Affero General Public License
Browse wrap
Caselex
CeCILL
Center for Copyright Information
Child Protection Registry Acts
Clean room design
Clickwrap
Community Broadband Bill
Computational law
Computer and Internet Protocol Address Verifier
Computer trespass
Contributor License Agreement
CONTU
Copyright Alert System
Copyright aspects of hyperlinking and framing
Legal aspects of file sharing
Creative Commons jurisdiction ports
Creative Commons license
Creative Commons-licensed content directories
Crypto-anarchism
Cyber defamation law
Cyberstalking legislation
Cyprus Safer Internet Hotline
Data discrimination
Data haven
Deep linking
Digital commons (economics)
Digital evidence
Digital inheritance
Digital signatures and law
Decentralized autonomous organization
ElcomSoft
Electronic Commerce Protection Act
Electronic signature
Email spam legislation by country
End-user license agreement
Eolas
ESign (India)
European Union Public Licence
Export of cryptography
Export of cryptography from the United States
Free license
GNU General Public License
GNU Lesser General Public License
GPL font exception
GPL linking exception
Gpl-violations.org
Illegal prime
Information privacy law
Legal issues with BitTorrent
Internet as a source of prior art
Internet taxes
Law of the Horse
Limitations on exclusive rights: Computer programs
Magic Lantern (software)
Motion Picture Association of America
Net neutrality in the Netherlands
Net neutrality law
Newzbin
Barbara Nitke
Notice and take down
Notorious markets
Open Music Model
Open source
Open Source Observatory and Repository
Payment Card Industry Data Security Standard
Permissive free software licence
Personal jurisdiction over international defendants in the United States
Magna Carta for Philippine Internet Freedom
Legality of piggybacking
Platform for Internet Content Selection
Policies promoting wireless broadband in the United States
Proprietary software
Protected computer
Return merchandise authorization
Scientology and the Internet
Principality of Sealand
Search neutrality
Security breach notification laws
SecurityMetrics
Suzanne Shell
Shrink wrap contract
Smart contract
Software law
Source code escrow
Structure, sequence and organization
Taxation of digital goods
Title 21 CFR Part 11
US State Laws and Policies for ICT Accessibility
Warrant canary
Bernstein v. United States
Chamberlain Group, Inc. v. Skylink Technologies, Inc.
Cryptography law
DeCSS
Digital rights management
ECC patents
Electronic Communications Act 2000
Electronic Signatures in Global and National Commerce Act
Government Paperwork Elimination Act
Illegal number
In re Boucher
Junger v. Daley
Peter Junger
Key disclosure law
Massachusetts Bay Transportation Authority v. Anderson
Microsystems Software, Inc. v. Scandinavia Online AB
Penet remailer
Qrpff
RealNetworks, Inc. v. DVD Copy Control Ass'n, Inc.
Texas Instruments signing key controversy
United States v. Fricosu
Universal City Studios, Inc. v. Reimerdes
2013 International child pornography investigation
Additional Protocol to the Convention on Cybercrime
APT29
Avalanche (phishing group)
Art Bowker
Brandjacking
Bulletproof hosting
Cybercrime in Canada
Carder.su
Carding (fraud)
Cellphone surveillance
Computer security
Convention on Cybercrime
Counterfeit medicines online
Crime forum
Cyber Crime Unit (Hellenic Police)
Cyber Intelligence Sharing and Protection Act
Cyber Threat Intelligence Integration Center
Cyberbullying
Cybercrime
Cybercrime countermeasures
Cyberextortion
Cyberextortionist
Cyberheist
Cybersecurity Information Sharing Act
Cyberstalking
Cyberterrorism
Dark web
Dark0de
DarkMarket
Domain hijacking
Domain name scams
Doppelganger domain
Four Horsemen of the Infocalypse
HackBB
H*Commerce: The Business of Hacking You
Hell (forum)
High Technology Crime Investigation Association
Ilbe Storehouse
International cybercrime
Internet and terrorism
Internet homicide
Keystroke logging
Kingpin (book)
Mazafaka (hacker group)
McColo
Gary McKinnon
MediaDefender
Minecode
MPack (software)
Murder of Ofir Rahum
Murder of Troy LaFerrara
National Cyber Crime Unit
Omega Engineering
Online predator
Operation Cybersnare
Operation Delego
Operation Onymous
Operation Payback
Operation Protect Our Children
Operation Shrouded Horizon
Operation Tovar
Pakbugs
Password cracking
People v. Marquan M.
Phishing
PhishTank
Political repression of cyber-dissidents
Pranknet
Protecting Canadians from Online Crime Act
Rescator
Reverse domain hijacking
Russian Business Network
Santrex
Scareware
Sextortion
ShadowCrew
SMS spoofing
Snarfing
Social engineering (security)
Spamming
Stop Cyberbullying Day
Tabnabbing
Tatort Internet
Technical support scam
TheRealDeal
Tor Carding Forum
The Truth about Truman School
Typosquatting
VANK
David S. Wall
Website correlation
Wifiphisher
Youth Internet Safety Survey
Anticybersquatting Consumer Protection Act
Child Online Protection Act
Children's Internet Protection Act
Children's Online Privacy Protection Act
Combating Online Infringement and Counterfeits Act
Communications Decency Act
Computer Security Act of 1987
Deleting Online Predators Act of 2006
Digital Millennium Copyright Act
Digital Signature and Electronic Authentication Law
E-Government Act of 2002
Federal Information Security Management Act of 2002
Gramm–Leach–Bliley Act
High Performance Computing Act of 1991
Internet Freedom and Nondiscrimination Act of 2006
Internet Radio Equality Act
List of organizations with official stances on the SOPA and PIPA
List of US Congresspersons who support or oppose SOPA/PIPA
National Information Infrastructure Protection Act
Networking and Information Technology Research and Development
No Electronic Theft Act
Online Copyright Infringement Liability Limitation Act
Online Privacy Protection Act
Online Protection and Enforcement of Digital Trade Act
Operation In Our Sites
PROTECT IP Act
Protecting Children from Internet Pornographers Act of 2011
Section 230 of the Communications Decency Act
Stop Online Piracy Act
Unlocking Consumer Choice and Wireless Competition Act