Cybercrimes: a multidisciplinary analysis
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Heidelberg [u.a.]
Springer
2010
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIX, 414 S. Ill. |
ISBN: | 9783642135460 9783642135477 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036490394 | ||
003 | DE-604 | ||
005 | 20120820 | ||
007 | t | ||
008 | 100608s2010 gw a||| |||| 00||| eng d | ||
015 | |a 10,N21 |2 dnb | ||
016 | 7 | |a 1002540666 |2 DE-101 | |
020 | |a 9783642135460 |c GB. : ca. EUR 149.75 (freier Pr.), ca. sfr 217.50 (freier Pr.) |9 978-3-642-13546-0 | ||
020 | |a 9783642135477 |9 978-3-642-13547-7 | ||
024 | 3 | |a 9783642135460 | |
028 | 5 | 2 | |a 80015714 |
035 | |a (OCoLC)700630986 | ||
035 | |a (DE-599)DNB1002540666 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-355 |a DE-M382 |a DE-11 |a DE-19 | ||
082 | 0 | |a 364.168 |2 22/ger | |
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
084 | |a 340 |2 sdnb | ||
084 | |a 004 |2 sdnb | ||
084 | |a 360 |2 sdnb | ||
245 | 1 | 0 | |a Cybercrimes |b a multidisciplinary analysis |c Sumit Ghosh ... (eds.) |
264 | 1 | |a Heidelberg [u.a.] |b Springer |c 2010 | |
300 | |a XIX, 414 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ghosh, Sumit |d 1958- |0 (DE-588)128641754 |4 edt | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3476825&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020412998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020412998 |
Datensatz im Suchindex
_version_ | 1805094147745382400 |
---|---|
adam_text |
CONTENTS PART I INTRODUCING CYBERCRIMES 1 A PRAGMATIC, EXPERIENTIAL
DEFINITION OF COMPUTER CRIMES 3 1.1 INTRODUCING COMPUTER CRIMES 3 1.1.1
THE MELISSA VIRUS: THE TURNING POINT 3 1.1.2 CYBERCRIMES IN EARLY 2001 8
1.1.3 DEFINING TECHNICAL CYBERCRIME 9 1.2 THE BATTLE TO CONTROL THE
COMPUTING PROCESS 11 1.2.1 THE NATURE OF THE BATTLE 11 1.2.2 THE
CYBERBATTLEFIELD 11 1.3 TOOLS FOR FIGHTING THE BATTLE TO CONTROL THE
COMPUTING PROCESS 18 1.3.1 DEFINING TOOLS 18 1.3.2 THE ATTACKER'S
TECHNICAL TOOLS 18 1.3.3 THE ATTACKER'S SOCIAL TOOLS 20 1.3.4 THE
DEFENDER'S TOOLS 21 1.4 THE CONVENIENCE OVERSHOOT WARNING 22 REFERENCES
23 PART II COMPUTING AND NETWORKING TECHNOLOGY AND CYBERCRIMES 2
UNAUTHORIZED INTRUSIONS AND DENIAL OF SERVICE 27 2. 1 UNAUTHORIZED
INTRUSIONS 27 2.1.1 TOOLS TO EXPLOIT UNAUTHORIZED INTRUSIONS 28 2.1.2
DEPLOYMENT OF TOOLKITS FOR UNAUTHORIZED INTRUSIONS 34 2.2 DENIAL OF
SERVICE 40 2.2.1 DIFFERENT MANIFESTATIONS OF DDOS ATTACKS 41 2.2.2
TOOLKITS FOR DDOS 43 REFERENCES 44 3 MALICIOUS CODE 45 3.1 INTRODUCTION
45 3.1.1 TRENDS THAT FACILITATE MALICIOUS CODE TO THRIVE 47
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1002540666 DIGITALISIERT
DURCH CONTENTS 3.2 THE NATURE OF MALICIOUS CODE 48 3.2.1 OPERATIONAL
PHASES OF MALICIOUS CODE 50 3.3 CATEGORIES OF MALICIOUS CODE 51 3.3.1
VIRUSES 51 3.3.2 WORMS 52 3.3.3 TROJAN HORSE PROGRAMS 56 3.3.4 ZOMBIES
56 3.3.5 ADWARE 57 3.3.6 MALICIOUS MOBILE CODE 58 3.4 A CLOSER LOOK INTO
THE INNER WORKINGS OF MALICIOUS CODE 58 3.4.1 CODE RED 58 3.4.2 NIMDA 60
3.4.3 SLAMMER 61 3.5 MALICIOUS CODE CREATION PROCESS 62 3.6 TECHNIQUES
TO DEFEAT MALICIOUS CODE 64 3.6.1 HOST-BASED PROTECTION 64 3.6.2
NETWORK-BASED PROTECTION 66 3.7 VULNERABILITY MANAGEMENT AND PATCHING 67
3.8 THE FUTURE OF MALICIOUS CODE AND NEW MITIGATION APPROACHES 68 3.8.1
THE FUTURE OF MALICIOUS CODE 68 3.8.2 THE FUTURE OF MITIGATION
APPROACHES 69 REFERENCES 71 RESTRICTING ANTI-CIRCUMVENTION DEVICES 73 4.
1 BACKGROUND: THE DIFFERENCE BETWEEN DIGITAL AND ANALOG 73 4.2 LAW IS
INADEQUATE AND TECHNOLOGY IS NECESSITATED 75 4.3 CONTENT PROTECTION
EFFORTS 76 4.3.1 COPY PREVENTION 76 4.3.2 LICENSES AND LEGAL AGREEMENTS
77 4.3.3 DATA FORMAT AS BARRIERS 77 4.3.4 SOFTWARE-BASED COPY-PROTECTION
SYSTEMS 78 4.3.5 DIGITAL MILLENNIUM COPYRIGHT ACT 79 4.3.6 CONDITIONAL
ACCESS 79 4.4 THE NATURE OF THE THREAT 80 4.4.1 CASUAL COPIERS 80 4.4.2
PEER-TO-PEER PIRATES 80 4.4. CONTENTS XI 4.7 A PRIMER ON ENCRYPTION 84
4.7.1 NOMENCLATURE 85 4.7.2 CIPHERS, KEYS, AND SECURITY 85 4.7.3
SECRET-KEY ENCRYPTION 86 4.7.4 PUBLIC-KEY ENCRYPTION 87 4.8
CONTENT-PROTECTION APPROACHES 87 4.8.1 SYSTEMS PROVIDING READ ACCESS TO
CONTENT 88 4.8.2 SYSTEM-LEVEL CONTENT PROTECTION 91 4.8.3 MICROSOFT'S
AND INTEL'S DIRECTIONS 92 4.9 SUMMARY AND CONCLUSIONS 93 REFERENCES 93 5
INFORMATION SECURITY 95 5.1 INTRODUCTION 95 5.2 CURRENT TECHNOLOGICAL
THREATS 96 5.2.1 TRUSTED COMPUTING 96 5.2.2 SOFTWARE WEAKNESSES: A ROOT
CAUSE 98 5.2.3 MALICIOUS CODE: VIRUSES AND WORMS 99 5.2.4 MOBILE CODE
101 5.2.5 ILLICIT CONNECTIONS 103 5.2.6 EAVESDROPPING 105 5.2.7
NETWORK-BASED ATTACKS 108 5.2.8 DENIAL OF SERVICE (DOS) 109 5.2.9
PATCHWORK QUILT 110 5.3 TECHNICAL APPROACHES TO SOLVING SECURITY
PROBLEMS 110 5.3.1 ANTIVIRUS SOFTWARE ILL 5.3.2 DEMOBILIZING CODE 112
5.3.3 ENCRYPTION 114 5.3.4 FIREWALLS 115 5.3.5 INTRUSION DETECTION
SYSTEMS 117 5.3.6 VIRTUAL PRIVATE NETWORKS (VPNS) 118 5.3.7 PHYSICAL
SECURITY MEASURES 118 5.4 PEOPLE PROBLEMS 119 5.4.1 FAILURE TO REPORT
SECURITY PROBLEMS 121 5.4.2 POLICY 123 5.5 SUMMARY 124 REFERENCES 124
PART III ECONOMIC IMPACT OF CYBERCRIMES 6 ECONOMIC CONSEQUENCES 1 2 XII
CONTENTS 6.3 MALICIOUS CODE ATTACKS 132 6.3.1 PROPOSED METHODOLOGY TO
MEASURE ECONOMIC IMPACT 133 6.3.2 DATA ACQUISITION AND COMPUTING
ECONOMIC IMPACT 136 6.3.3 INCIDENT REPORT TO FACILITATE DATA ACQUISITION
138 REFERENCES 140 7 INFOSECURITY FUNDING 141 7.1 THE INFOSEC RESEARCH
COUNCIL 142 7.2 THE CURRENT STATE OF INFOSEC RESEARCH 145 7.2.1 DATA
COLLECTION 145 7.2.2 PROJECTS AND THE LIST OF "HARD PROBLEMS" 145 7.2.3
HOW MUCH MONEY IS BEING SPEND AND WHERE? 146 7.3 RESEARCH GOALS 146
7.3.1 RECOMMENDATIONS 147 REFERENCES 150 8 INFORMATION AND COMPUTER
SECURITY RISK MANAGEMENT 151 8.1 PRIVATE INDUSTRY EFFECTIVENESS: THE
NEED FOR A RISK MANAGEMENT PERSPECTIVE 151 8.2 DEFINITIONS OF RISK AND
ENTERPRISE RISK 152 8.3 RISK MANAGEMENT AND THE RISK MANAGEMENT PROCESS
152 8.4 RISK MANAGEMENT ANALYSIS 153 8.5 RISK PREVENTION 157 8.6 RISK
MITIGATION , 159 8.7 THE NEED FOR A SECURITY BREACH INCIDENT RESPONSE
PLAN 160 8.8 RISK FINANCING 160 8.9 SUMMARY 162 REFERENCES 163 9 TREND
ANALYSIS FOR DIGITAL RISK MANAGEMENT 165 REFERENCES 170 PART IV CRITICAL
INFRASTRUCTURE PROTECTION AND CYBERCRIMES 10 EVOLUTIONARY HISTORY OF
CRITICAL INFRASTRUCTURE PROTECTION IN THE USA 173 10.1 WHAT IS "CRITICAL
INFRASTRUCTURE"? 174 10. CONTENTS XIII 10.3.3 THE CRIMINAL LAW
ENFORCEMENT AND NATIONAL INTELLIGENCE DIVIDE 186 10.3.4 U.S. MILITARY
CIP AND CYBER ACTIVITIES 190 10.3.5 CHANGES IN FEDERAL LAW IN SUPPORT OF
CIP 194 REFERENCES 195 11 CRITICAL INFRASTRUCTURE PROTECTION POLICY IN
THE US 1 99 12 SCIENTIFIC AND TECHNOLOGICAL NATURE OF CRITICAL
INFRASTRUCTURE VULNERABILITIES 203 12.1 THE ELECTRIC POWER GRID 203 12.2
OTHER CRITICAL INFRASTRUCTURES 207 REFERENCES 208 13 INTERNET
INFRASTRUCTURE ATTACKS 209 13.1 INTERNET ROUTER ATTACKS 209 13.2 DOMAIN
NAME SERVICES (DNS) ATTACKS 211 PART V PSYCHO-SOCIAL IMPACT OF
CYBERCRIMES 14 THE PSYCHE OF CYBERCRIMINALS: A PSYCHO-SOCIAL PERSPECTIVE
217 14.1 INTRODUCTION 217 14.2 WHO IS DRAWN TO CYBERCRIMES 217 14.2.1
TAXONOMY 218 14.2.2 LIMITATIONS 222 14.3 WHY ARE CYBERCRIMINALS
ATTRACTED TO COMMIT CRIMES 223 14.3.1 SOCIAL LEARNING THEORY 223 14.3.2
MORAL DISENGAGEMENT 226 14.3.3 ANONYMITY 228 14.4 STRATEGIES TO CONTAIN
CYBERCRIMINAL BEHAVIORS: DETERRENCE AND REHABILITATION 229 14.4.1
CYBERCRIME LAWS 229 14.4.2 SOCIAL SANCTIONS 231 14.4.3 EDUCATION 233
14.5 CONCLUSIONS 234 REFERENCES 235 PART VI CYBERCRIME REGULATION
THROUGH CIVIL AND CRIMINAL PENALTIES 15 SPURRING THE PRIVATE SECTOR:
INDIRECT FEDERAL REGULATION OFCYBERSECURITYINTHEU XIV CONTENTS 15.2.3
IDENTITY THEFT LAW 247 15.2.4 INDIRECT REGULATION THROUGH LAWS IMPOSING
LIABILITY AND THROUGH THE ESTABLISHMENT OF BEST PRACTICES AND STANDARDS
249 15.2.5 BEST PRACTICES 250 15.2.6 FEDERAL CYBERSECURITY STANDARDS 250
15.3 INDIRECT REGULATION THROUGH MARKET FORCES 252 15.3.1 CYBERINSURANCE
MARKETS 252 15.3.2 PUBLIC-PRIVATE INFORMATION SHARING INITIATIVES 254
15.3.3 FEDERALLY-FUNDED RESEARCH AND DEVELOPMENT 259 15.3.4
FEDERALLY-FUNDED EDUCATIONAL PROGRAMS 261 15.4 INDIRECT REGULATION
THROUGH SOCIAL NORMS 262 15.4.1 CYBERCITIZEN PARTNERSHIP 262 15.5
CONCLUSIONS 262 REFERENCES 263 16 CRIMINAL REGULATIONS 265 16.1
SUBSTANTIVE LAWS ADDRESSING DIGITAL CRIMES 265 16.1.1 COMPUTER AND
NETWORK CRIMES 265 16.1.2 INTELLECTUAL PROPERTY VIOLATIONS 277 16.1.3
CRIMES AGAINST PERSONS & OTHER UNLAWFUL DIGITAL CONDUCT 282 16.1.4
WIRETAP ACT 285 16.2 CHALLENGES CREATED BY COMPUTER AND NETWORK CRIMES
286 16.2.1 JURISDICTION 286 16.2.2 MASKING TECHNIQUES 289 16.2.3
REPORTING 290 16.3 PROCEDURAL LAWS ADDRESSING COMPUTER AND NETWORK
CRIMES 292 16.3.1 COMPUTER AND NETWORK CRIMES 292 16.3.2 REAL TIME
TRANSMISSION AND INTERCEPTION 296 16.3.3 STORED ELECTRONIC
COMMUNICATIONS 299 16.4 INVESTIGATORY CHALLENGES 302 16.4.1 JURISDICTION
302 16.4.2 VENUE 303 16.5 OPERATIONAL CHALLENGES 304 16. CONTENTS XV
PART VII INTERNATIONAL CHARACTER OF CYBERCRIMES 17 INTERNATIONAL
DIMENSIONS OF CYBERCRIME 311 17.1 A GLOBAL PERSPECTIVE ON CYBERCRIME 311
17.2 THE GLOBALIZATION OF CRIME 312 17.3 A NEW WAY TO VIEW CRIME IN THE
GLOBAL VILLAGE 315 17.4 THE NETWORKED WORLD 317 17.5 THE LOVE BUG AND
INTERNATIONAL CYBERCRIME: A CASE STUDY 317 17.6 INTERNATIONAL LAW AND
CYBERCRIME 320 17.6.1 JURISDICTION 321 17.6.2 EXTRADITION AND POTENTIAL
CONFLICT OF NATIONS' LAWS 323 17.6.3 SEARCH AND SEIZURE 323 17.7
INTERNATIONAL EFFORTS TO COMBAT CYBERCRIME 325 17.7.1 THE ORGANIZATION
FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD) 326 17.7.2 THE UNITED
NATIONS 327 17.7.3 THE GROUP OF 8 (G-8) 328 17.7.4 THE COUNCIL OF EUROPE
330 17.7.5 OTHER FORA AND INTERPOL 331 17.8 THE IMPORTANCE OF BUILDING
INTERNATIONAL CONSENSUS ON CYBERCRIMES 333 17.9 CONCLUSION 334
REFERENCES 336 18 FORMIDABLE CHALLENGES POSED BY CYBERCRIMES 341 18.1
ELECTRONIC MEDICAL RECORDS AND CYBERCRIMES 342 18.1.1 VULNERABILITY OF
EMRS 343 18.1.2 CONSEQUENCES OF EMRS COMPROMISES 344 18.1.3 FAR-REACHING
BENEFITS OF EMRS? 345 18.1.4 A FORMIDABLE CHALLENGE TO EMRS AND EMBS?
347 18.2 EM-MONEY AND CYBERCRIMES 348 18.2.1 THE ORIGIN OF MONEY 348
18.2.2 THE EVOLUTION OF MONEY 348 18.2.3 CHARACTERISTICS OF FUTURE MONEY
349 18.2. XVI CONTENTS PART VIII MITIGATION OF CYBERCRIMES 19 INCREASING
ATTACK COSTS & RISKS AND REDUCING ATTACK MOTIVATIONS . .365 19. 1
BEHAVIORAL SCIENCE RESEARCH AND TRADITIONAL DETERRENCE 366 19.1.1 THE
CRIMINAL JUSTICE SYSTEM, BY ITSELF, DOES NOT ADEQUATELY PREVENT CRIME
366 19.1.2 WHY DOES ANYONE OBEY THE LAW: SOCIAL STIGMA AND CONSCIENCE?
367 19.1.3 NEED FOR A HOLISTIC CRIME PREVENTION APPROACH 368 19.1.4 NEED
TO TARGET COST, RISK, AND MOTIVATION 368 19.1.5 SUMMARY 369 19.2 IMPACT
OF TRADITIONAL DETERRENCE ON CYBERCRIMES 369 19.2.1 RESEARCH INTO
TRADITIONAL DETERRENCE 369 19.2.2 LOW APPREHENSION PROBABILITY FOR
CYBERCRIMES 370 19.2.3 MINIMAL SOCIAL STIGMA FROM COMPUTING CRIMES 370
19.2.4 ABUNDANCE OF VULNERABLE TARGETS 370 19.2.5 SUMMARY 374 19.3
RELATIVE EFFECTIVENESS OF RAISING ATTACK COSTS AND ATTACK RISKS AND
REDUCING ATTACK MOTIVATION 374 REFERENCES 375 PART IX FUTURE OF
CYBERCRIMES: WHO WILL HAVE THE LAST WORD? 20 NATURE OF CYBERATTACKS IN
THE FUTURE 379 20. 1 THE ENGINEERING FUNDAMENTALS OF NETWORKED SYSTEMS
380 20.2 POTENTIAL ADVANCES IN NETWORKED SYSTEM STEMMING FROM ITS
FUNDAMENTAL NATURE 381 20.3 LONG-TERM INNOVATIONS IN NETWORKED SYSTEMS
388 20.3.1 GENERALIZED NETWORKS 388 20.3.2 STRICTLY INANIMATE NETWORKED
SYSTEMS 389 20.3. |
any_adam_object | 1 |
author2 | Ghosh, Sumit 1958- |
author2_role | edt |
author2_variant | s g sg |
author_GND | (DE-588)128641754 |
author_facet | Ghosh, Sumit 1958- |
building | Verbundindex |
bvnumber | BV036490394 |
classification_rvk | PZ 3700 |
ctrlnum | (OCoLC)700630986 (DE-599)DNB1002540666 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft Informatik Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV036490394</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120820</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100608s2010 gw a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N21</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1002540666</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642135460</subfield><subfield code="c">GB. : ca. EUR 149.75 (freier Pr.), ca. sfr 217.50 (freier Pr.)</subfield><subfield code="9">978-3-642-13546-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642135477</subfield><subfield code="9">978-3-642-13547-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642135460</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">80015714</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700630986</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1002540666</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-M382</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">340</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">360</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybercrimes</subfield><subfield code="b">a multidisciplinary analysis</subfield><subfield code="c">Sumit Ghosh ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 414 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghosh, Sumit</subfield><subfield code="d">1958-</subfield><subfield code="0">(DE-588)128641754</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3476825&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020412998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020412998</subfield></datafield></record></collection> |
id | DE-604.BV036490394 |
illustrated | Illustrated |
indexdate | 2024-07-20T10:38:45Z |
institution | BVB |
isbn | 9783642135460 9783642135477 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020412998 |
oclc_num | 700630986 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-M382 DE-11 DE-19 DE-BY-UBM |
owner_facet | DE-355 DE-BY-UBR DE-M382 DE-11 DE-19 DE-BY-UBM |
physical | XIX, 414 S. Ill. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
spelling | Cybercrimes a multidisciplinary analysis Sumit Ghosh ... (eds.) Heidelberg [u.a.] Springer 2010 XIX, 414 S. Ill. txt rdacontent n rdamedia nc rdacarrier Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s DE-604 Ghosh, Sumit 1958- (DE-588)128641754 edt text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3476825&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020412998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cybercrimes a multidisciplinary analysis Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)7864395-8 |
title | Cybercrimes a multidisciplinary analysis |
title_auth | Cybercrimes a multidisciplinary analysis |
title_exact_search | Cybercrimes a multidisciplinary analysis |
title_full | Cybercrimes a multidisciplinary analysis Sumit Ghosh ... (eds.) |
title_fullStr | Cybercrimes a multidisciplinary analysis Sumit Ghosh ... (eds.) |
title_full_unstemmed | Cybercrimes a multidisciplinary analysis Sumit Ghosh ... (eds.) |
title_short | Cybercrimes |
title_sort | cybercrimes a multidisciplinary analysis |
title_sub | a multidisciplinary analysis |
topic | Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Internetkriminalität |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3476825&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020412998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ghoshsumit cybercrimesamultidisciplinaryanalysis |