Combating computer crime: prevention, detection, investigation
Computer crime has the potential to touch almost every organization and, with losses reaching tens of millions of dollars each year, many companies are establishing programs designed to prevent and detect this growing problem. Combating Computer Crime: Prevention, Detection, Investigation outlines p...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
McGraw-Hill
1992
|
Ausgabe: | 1. ed., 1. print. |
Schlagworte: | |
Zusammenfassung: | Computer crime has the potential to touch almost every organization and, with losses reaching tens of millions of dollars each year, many companies are establishing programs designed to prevent and detect this growing problem. Combating Computer Crime: Prevention, Detection, Investigation outlines practical solutions for reducing or eliminating the risk of illegal access and tampering with computer data. The focus of this timely handbook is prevention. You'll learn how to assess your company's vulnerability, how prevention programs work, and how they can be implemented and audited. The authors also explain how to detect perpetrators, and they give you guidelines on precise steps you can take when an incident occurs. Based on the computer crime vulnerability self-assessment checklist, you'll customize your program to meet the specific needs of your organization. You'll learn how to develop an effective management plan of action that defines procedures, standards, and guidelines for the execution of company policy. This book also reveals how to identify threats and prevent perpetrations from inside and outside your company; select the management approach needed to minimize your company's risk; complete a vulnerability profile; protect your data from viruses; and implement and audit prevention programs. Financial losses from computer crime can be staggering. With Combating Computer Crime: Prevention, Detection, Investigation you'll be able to fight back, using the latest in computer security techniques. If you're involved in the planning, development, or use of computer systems, this invaluable reference belongs on your desk. |
Beschreibung: | 311 S. graph. Darst. |
ISBN: | 0830676643 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV005594387 | ||
003 | DE-604 | ||
005 | 20030320 | ||
007 | t | ||
008 | 921015s1992 d||| |||| 00||| eng d | ||
020 | |a 0830676643 |9 0-8306-7664-3 | ||
035 | |a (OCoLC)22209560 | ||
035 | |a (DE-599)BVBBV005594387 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-91G |a DE-739 | ||
050 | 0 | |a HV8079.C65 | |
082 | 0 | |a 363.2/5968 |2 20 | |
084 | |a PH 6404 |0 (DE-625)136436:405 |2 rvk | ||
084 | |a DAT 055f |2 stub | ||
245 | 1 | 0 | |a Combating computer crime |b prevention, detection, investigation |c Chantico Publishing Company |
250 | |a 1. ed., 1. print. | ||
264 | 1 | |a New York [u.a.] |b McGraw-Hill |c 1992 | |
300 | |a 311 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a Computer crime has the potential to touch almost every organization and, with losses reaching tens of millions of dollars each year, many companies are establishing programs designed to prevent and detect this growing problem. Combating Computer Crime: Prevention, Detection, Investigation outlines practical solutions for reducing or eliminating the risk of illegal access and tampering with computer data. The focus of this timely handbook is prevention. You'll learn how to assess your company's vulnerability, how prevention programs work, and how they can be implemented and audited. The authors also explain how to detect perpetrators, and they give you guidelines on precise steps you can take when an incident occurs. Based on the computer crime vulnerability self-assessment checklist, you'll customize your program to meet the specific needs of your organization. You'll learn how to develop an effective management plan of action that defines procedures, standards, and guidelines for the execution of company policy. This book also reveals how to identify threats and prevent perpetrations from inside and outside your company; select the management approach needed to minimize your company's risk; complete a vulnerability profile; protect your data from viruses; and implement and audit prevention programs. Financial losses from computer crime can be staggering. With Combating Computer Crime: Prevention, Detection, Investigation you'll be able to fight back, using the latest in computer security techniques. If you're involved in the planning, development, or use of computer systems, this invaluable reference belongs on your desk. | |
650 | 4 | |a Crimes par ordinateur - Prévention | |
650 | 4 | |a Criminalité informatique - Enquêtes | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 1 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | |5 DE-604 | |
710 | 2 | |a Chantico Publishing Co., Inc. (Dallas, Tex.) |e Sonstige |0 (DE-588)16123064-7 |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-003504268 |
Datensatz im Suchindex
_version_ | 1804119807893700608 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV005594387 |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 |
callnumber-search | HV8079.C65 |
callnumber-sort | HV 48079 C65 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | PH 6404 |
classification_tum | DAT 055f |
ctrlnum | (OCoLC)22209560 (DE-599)BVBBV005594387 |
dewey-full | 363.2/5968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.2/5968 |
dewey-search | 363.2/5968 |
dewey-sort | 3363.2 45968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft Informatik Soziologie |
edition | 1. ed., 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03290nam a2200481 c 4500</leader><controlfield tag="001">BV005594387</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030320 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">921015s1992 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0830676643</subfield><subfield code="9">0-8306-7664-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)22209560</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV005594387</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8079.C65</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.2/5968</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PH 6404</subfield><subfield code="0">(DE-625)136436:405</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Combating computer crime</subfield><subfield code="b">prevention, detection, investigation</subfield><subfield code="c">Chantico Publishing Company</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed., 1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">1992</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">311 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Computer crime has the potential to touch almost every organization and, with losses reaching tens of millions of dollars each year, many companies are establishing programs designed to prevent and detect this growing problem. Combating Computer Crime: Prevention, Detection, Investigation outlines practical solutions for reducing or eliminating the risk of illegal access and tampering with computer data. The focus of this timely handbook is prevention. You'll learn how to assess your company's vulnerability, how prevention programs work, and how they can be implemented and audited. The authors also explain how to detect perpetrators, and they give you guidelines on precise steps you can take when an incident occurs. Based on the computer crime vulnerability self-assessment checklist, you'll customize your program to meet the specific needs of your organization. You'll learn how to develop an effective management plan of action that defines procedures, standards, and guidelines for the execution of company policy. This book also reveals how to identify threats and prevent perpetrations from inside and outside your company; select the management approach needed to minimize your company's risk; complete a vulnerability profile; protect your data from viruses; and implement and audit prevention programs. Financial losses from computer crime can be staggering. With Combating Computer Crime: Prevention, Detection, Investigation you'll be able to fight back, using the latest in computer security techniques. If you're involved in the planning, development, or use of computer systems, this invaluable reference belongs on your desk.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crimes par ordinateur - Prévention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique - Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Chantico Publishing Co., Inc. (Dallas, Tex.)</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)16123064-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-003504268</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV005594387 |
illustrated | Illustrated |
indexdate | 2024-07-09T16:32:04Z |
institution | BVB |
institution_GND | (DE-588)16123064-7 |
isbn | 0830676643 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-003504268 |
oclc_num | 22209560 |
open_access_boolean | |
owner | DE-12 DE-91G DE-BY-TUM DE-739 |
owner_facet | DE-12 DE-91G DE-BY-TUM DE-739 |
physical | 311 S. graph. Darst. |
publishDate | 1992 |
publishDateSearch | 1992 |
publishDateSort | 1992 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Combating computer crime prevention, detection, investigation Chantico Publishing Company 1. ed., 1. print. New York [u.a.] McGraw-Hill 1992 311 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer crime has the potential to touch almost every organization and, with losses reaching tens of millions of dollars each year, many companies are establishing programs designed to prevent and detect this growing problem. Combating Computer Crime: Prevention, Detection, Investigation outlines practical solutions for reducing or eliminating the risk of illegal access and tampering with computer data. The focus of this timely handbook is prevention. You'll learn how to assess your company's vulnerability, how prevention programs work, and how they can be implemented and audited. The authors also explain how to detect perpetrators, and they give you guidelines on precise steps you can take when an incident occurs. Based on the computer crime vulnerability self-assessment checklist, you'll customize your program to meet the specific needs of your organization. You'll learn how to develop an effective management plan of action that defines procedures, standards, and guidelines for the execution of company policy. This book also reveals how to identify threats and prevent perpetrations from inside and outside your company; select the management approach needed to minimize your company's risk; complete a vulnerability profile; protect your data from viruses; and implement and audit prevention programs. Financial losses from computer crime can be staggering. With Combating Computer Crime: Prevention, Detection, Investigation you'll be able to fight back, using the latest in computer security techniques. If you're involved in the planning, development, or use of computer systems, this invaluable reference belongs on your desk. Crimes par ordinateur - Prévention Criminalité informatique - Enquêtes Computer crimes Investigation Computer crimes Prevention Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s Bekämpfung (DE-588)4112701-8 s DE-604 USA (DE-588)4078704-7 g Chantico Publishing Co., Inc. (Dallas, Tex.) Sonstige (DE-588)16123064-7 oth |
spellingShingle | Combating computer crime prevention, detection, investigation Crimes par ordinateur - Prévention Criminalité informatique - Enquêtes Computer crimes Investigation Computer crimes Prevention Computerkriminalität (DE-588)4010452-7 gnd Bekämpfung (DE-588)4112701-8 gnd |
subject_GND | (DE-588)4010452-7 (DE-588)4112701-8 (DE-588)4078704-7 |
title | Combating computer crime prevention, detection, investigation |
title_auth | Combating computer crime prevention, detection, investigation |
title_exact_search | Combating computer crime prevention, detection, investigation |
title_full | Combating computer crime prevention, detection, investigation Chantico Publishing Company |
title_fullStr | Combating computer crime prevention, detection, investigation Chantico Publishing Company |
title_full_unstemmed | Combating computer crime prevention, detection, investigation Chantico Publishing Company |
title_short | Combating computer crime |
title_sort | combating computer crime prevention detection investigation |
title_sub | prevention, detection, investigation |
topic | Crimes par ordinateur - Prévention Criminalité informatique - Enquêtes Computer crimes Investigation Computer crimes Prevention Computerkriminalität (DE-588)4010452-7 gnd Bekämpfung (DE-588)4112701-8 gnd |
topic_facet | Crimes par ordinateur - Prévention Criminalité informatique - Enquêtes Computer crimes Investigation Computer crimes Prevention Computerkriminalität Bekämpfung USA |
work_keys_str_mv | AT chanticopublishingcoincdallastex combatingcomputercrimepreventiondetectioninvestigation |