Investigating internet crimes: an introduction to solving crimes in cyberspace
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier
2014
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XXIII, 472 S. Ill., graph. Darst. |
ISBN: | 9780124078178 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041841281 | ||
003 | DE-604 | ||
005 | 20150512 | ||
007 | t | ||
008 | 140512s2014 ad|| |||| 00||| eng d | ||
020 | |a 9780124078178 |9 978-0-12-407817-8 | ||
035 | |a (OCoLC)881696644 | ||
035 | |a (DE-599)BSZ396467490 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-11 | ||
084 | |a AP 15972 |0 (DE-625)6968: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 614f |2 stub | ||
084 | |a DAT 055f |2 stub | ||
100 | 1 | |a Shipley, Todd G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Investigating internet crimes |b an introduction to solving crimes in cyberspace |c Todd G. Shipley ; Art Bowker |
264 | 1 | |a Amsterdam |b Elsevier |c 2014 | |
300 | |a XXIII, 472 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Bowker, Art |e Verfasser |4 aut | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027285943&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027285943 |
Datensatz im Suchindex
_version_ | 1804152183289020416 |
---|---|
adam_text | INVESTIGATINGINTERNET
CRIMES
AN INTRODUCTION
TOSOLVING
CRIMES
INCYBERSPACE
TODD
G.SHIPLEY
ARTBOWKER
TECHNICAL
EDITOR
NICKSELBY
AMSTERDAM
*BOSTON
*HEIDELBERG
LONDON
NEW
YORK
OXFORD
*PARIS
*SAN
DIEGO
SAN
FRANCISCO
SINGAPORE
*SYDNEY
*TOKYO
ELSEVIER
SYNGRESS
ISAN
IMPRINT
OF
ELSEVIER
SVNGRESS
CONTENTS
FOREWORD
XV
PREFACE
XVII
ABOUT
THEAUTHORS
XIX
ABOUT
THETECHNICAL
EDITOR
XXI
ACKNOWLEDGMENTS
XXIII
CHAPTER1
INTRODUCTIONTOINTERNET
CRIME
1
DEFINING
INTERNET
CRIME
2
INTERNET
CRIME S
PREVALENCE
2
CSI
201012011
COMPUTER
CRIME
AND
SECURITY
SURVEY
4
NORTON*
CYBERCRIME
REPORT
2011
.4
HTCIA
2011
REPORT
ONCYBERCRIME
INVESTIGATION
5
MCAFEE
THREATS
REPORTS
6
2012
DATA
BREACH
INVESTIGATIONS
REPORT
8
INTERNET
CRIME
COMPLIANT
CENTER.
9
INTERNET
HARASSMENT
10
TRADITIONAL
CRIMES
AND
THE
INTERNET..
11
INVESTIGATIVE
RESPONSES
TOINTERNET
CRIME
12
WHY
INVESTIGATE
INTERNET
CRIME?
14
WHAT
ISNEEDED
TORESPOND
TOINTERNET
CRIME?
15
CONTINUING
INVESTIGATIVE
PROBLEMS
16
CONCLUSION
16
FURTHER
READING
17
CHAPTER2
INTERNETCRIMINALS
21
CYBERCRIME
PROFILING
22
INDUCTIVE
PROFILES
23
NEW
YORK
POLICE
CYBERSTALKING
STUDY
32
SEXOFFENDERS
ONLINE
ACTIVITIES
33
DEDUCTIVEPROFILING
36
CONCLUSION
37
FURTHER
READING
38
CHAPTER3
HOWTHEINTERNETWORKS
41
ASHORT
HISTORY
OFTHE
INTERNET..
42
THE
IMPORTANCE
OFIPADDRESSES
42
DHCP
AND
ASSIGNING
ADDRESSES
44
VII
VIII
CONTENTS
MAC ADDRESS
46
DOMAIN
NAME
SYSTEM
49
DNS
RECORDS
49
INTERNET
PROTOCOL
VERSION
6
53
DEFINING
IPV6
53
TRANSLATING
IPV6
53
IPV4-MAPPED
IPV6
ADDRESSES
54
IPV6
DUIO
55
THE
WORLD
WIDE
WEB
58
UNIFORM
RESOURCE
LOCATORS
58
DOMAIN
NAME
REGISTRATION
59
INTERNATIONALIZED
DOMAIN
NAMES
60
AUTONOMOUS
SYSTEM
NUMBER
61
OTHER
SERVICES
ONTHE
INTERNET
61
FILE
TRANSFER
PROTOCOL
61
EMAIL
ORTHE
SMTP
61
NEWS
GROUPS,
USENET,
ORTHE
NETWORK
NEWS
TRANSFER
PROTOCOL
63
CHATTING
WITH
IRC
64
RELEVANT
RFCS
64
CONCLUSION
65
FURTHER
READING
66
CHAPTER4
COLLECTING
LEGALLY
DEFENSIBLE
ONLINE
EVIDENCE
69
DEFINING
EVIDENCE
70
DIGITAL
VERSUS
ONLINE
EVIDENCE
73
BUILDING
AFOUNDATION
75
PRIVACY
82
MUTUAL
LEGAL
ASSISTANCE
89
GENERAL
GUIDANCE
90
CONCLUSION
94
FURTHER
READING
95
CHAPTER5
DOCUMENTING
ONLINE
EVIDENCE
99
PROCESS
FORDOCUMENTING
ONLINE
ESI..
99
COLLECTION
99
PRESERVATION
104
TOOLS/TECHNIQUES
FORDOCUMENTING
INTERNET
EVIDENCE
105
SAVE
AS
106
CONTENTS
IX
PICTURES AND
VIDEO
107
HASHING
EVIDENCE
107
COLLECTING
ENTIRE
WEBSITES
109
AUTHENTICATING
THE
COLLECTED
EVIDENCE
112
VALIDATION
OFONLINE
EVIDENCE
COLLECTION
TOOLS
113
WEBCASE
114
FIE1DCOLLECTION
OFONLINE
ESI
116
FIELD
PROCESS
FOR
USING
THE
INVESTIGATIVE
USB
DEVICE
120
COLLECTION
FROM
APPLE
MACINTOSH
121
APPLES
INTHE
FIELD
121
APPLE
OFFICE
COLLECTION
122
ORGANIZING
YOUR
ONLINE
ESI
124
THE
INVESTIGATIVE
REPORT..
125
CONCLUSION
127
FURTHER
READING
127
CHAPTER6
USING
ONLINE
INVESTIGATIVE
TOOLS
131
INVESTIGATIVE
TOOLBARS
131
VERE
SOFTWARE
INVESTIGATIVE
TOOLBAR
132
THE
INTERNET
INVESTIGATORS
TOOLKIT..
137
WHOIS
137
MX
FUNCTION
138
NETSTAT
139
PING
140
RESOLVE
140
TRACEROUTE
141
TCP/IP
FUNCTION
142
STATS
FUNCTION
143
OTHER
BUTTONS
144
PAID
ONLINE
SERVICES
144
LEXIS-NEXIS
145
TLO
145
CONCLUSION
146
FURTHER
READING
146
CHAPTER7
ONLINE
DIGITAL
OFFICER
SAFETY
149
DIGITAL
OFFICER
SAFETY
149
ONLINE
INVESTIGATIVE
COMPUTER
PROTECTION
PROCESS
150
BASIC
INVESTIGATIVE
COMPUTER
PROTECTION
152
X CONTENTS
CLONING ORIMAGE
THE
INVESTIGATOR
SCOMPUTER
162
KEEPING
YOUR
INVESTIGATIVE
COMPUTER
SECURE
164
ENCRYPTION
164
KEEPING
YOUR
SYSTEM
CLEAN
164
TESTING
YOUR
SECURITY
165
CONCLUSION
166
FURTHER
READING
166
CHAPTER8
TRACINGIPADDRESSESTHROUGHTHEINTERNET
171
TRACING
IPADDRESSES
171
ONLINE
TOOLS
FORTRACING
ANIPADDRESS
171
GEOLOCATION
OFANIPADDRESS
173
DIGGING
DEEPER
INTO
IPTRACING-WHAT
THE
DNS
TELLS
US
174
DNS
RECORDS
174
TRACING
EMAILS
176
WHERE
ISTHE
EVIDENCE?
178
VIEWING
EMAIL
HEADERS
179
TIME
DIFFERENCES
181
HEADER
INFORMATION
TRANSLATION
182
ANOTHER
EMAIL
HEADER
184
AMICROSOFT
OUTLOOK
HEADER
TRANSLATION
THROUGH
ANEXCHANGE
SERVER.
194
MULTIPURPOSE
INTERNET
MAIL
EXTENSIONS
194
LOOKING
ATLITTLE
X
197
FAKING
ANEMAIL
AND
HIDING
ITSSENDER
200
COLLECTING
EMAIL
FROM
AWEB-BASED
SYSTEM
201
MAIL
PROTOCOLS
201
RELEVANT
RFCS
RELATED
TOIPTRACING
207
CONCLUSIONS
208
FURTHER
READING
209
CHAPTER9
WORKINGUNSEENONTHEINTERNET.
211
INTERNET
ANONYMITY
211
RESPONSIBLE
USE
212
COMMON
METHODS
TOGAIN
WEB
ANONYMITY
213
WHAT
YOUR
COMPUTER
CAN
REVEAL
ABOUT
YOU
215
ANONYMIZING
YOUR
SURFING
216
USING
PROXY
SERVERS
WITH
YOUR
OWN
NETWORK
218
TOTOR
ORNOT
TOTOR
219
TOR S
HIDDEN
WEB
SERVICES
222
CONTENTS
XI
TOR AND
TAILS
224
TRACKING
CRIMINALS
WHO
USEANONYMOUS
METHODS
TOHIDE
225
TOOLS
FORCATCHING
THE
HIDING
INTERNET
TARGET
226
CONC1USION
229
FURTHER
READING
229
CHAPTER
10
COVER
OPERATIONS
ONTHE
INTERNET..
233
COVERT
OPERATIONS
ONTHE
INTERNET..
233
ON
THE
INTERNET
NOONE
KNOWS
YOU
ARE
ADOG
235
INTERNET
OPERATIONS
AND
POLICY
CONSIDERATIONS
235
BASIC
UNDERCOVER
PROCEDURES
240
CONCLUSIONS
250
FURTHER
READING
251
CHAPTER
11
CONDUCTING
REACTIVE
AND
PROACTIVE
INTERNET
INVESTIGATIONS
253
REACTIVE
VERSUS
PROACTIVE
INVESTIGATIONS
253
REACTIVE
INVESTIGATIONS
253
PROACTIVE
INVESTIGATIONS
256
MANAGING
UNDERCOVER
INTERNET
INVESTIGATIONS
262
INTERNET
INVESTIGATION
POLICY
263
OPERATIONAL
PLANNING
264
INTERNET
CRIME
ANALYSIS
266
CONCLUSION
266
REFERENCES
266
CHAPTER
12
INTERNET
RESOURCES
FOR
LOCATING
EVIDENCE
269
SOURCES
OFONLINE
INFORMATION
269
SEARCH
SERVICES
270
FINDING
INFORMATION
ONAPERSON
279
FINDING
BUSINESS
INFORMATION
281
USGOVERNMENT
SOURCES
282
NON-US
GOVERNMENT
SOURCES
282
NON-GOVERNMENT
SOURCES
283
FINDING
TELEPHONE
NUMBERS
AND
EMAIL
ADDRESSES
284
SEARCHING
BLOGS
284
PROFESSIONAL
COMMUNITIES
285
XII
CONTENTS
NEWS SEARCHES
286
VIDEO
NEWS
287
CONCLUSIONS
287
FURTHER
READING
288
CHAPTER13
INVESTIGATINGWEBSITESANDWEBPAGES
293
WEBPAGES
AND
WEBSITES
293
HOW
WEBPAGES
WORK
293
WEBSITE
STRUCTURE
294
HOW
MARKUP
LANGUAGES
WORK
294
WEBSITE
RECONNAISSANCE
296
URL
TRAITS
298
DOMAIN
REGISTRATION
299
WEBSITE
RANKING
AND
SEARCH
ENGINE
OPTIMIZATION
(SEO)
SITES
300
WEBSITE
HISTORY
RESEARCH
300
CHECKING
FORMALICIOUS
CODE
ONASITE
302
WEBPAGE
EXAMINATION
304
FOREIGN
LANGUAGE
WEBSITES
304
REVIEWING
SOURCE
CODE
305
DOCUMENTING
AWEBSITE S
MULTIMEDIA
AND
IMAGES
306
CAPTURING
WEBSITE
VIDEOS
307
THE
LEGAL
PROCESS
OFIDENTIFYING
AWEBSITE
311
MONITORING
WEBSITES
OVER
TIME
312
CONCLUSION
312
FURTHER
READING
312
CHAPTER14
INVESTIGATINGSOCIALNETWORKINGSITES
315
SOCIAL
NETWORKING S
IMPACT
ONLEGAL
SYSTEMS
315
LAW
ENFORCEMENT,
SOCIAL
MEDIA,
AND
THE
NEWS
316
SOCIAL
MEDIA
EVIDENCE
INTHE
COURTS
320
STARTING
ASOCIAL
NETWORKING
SITEINVESTIGATION
321
PLANNING
321
SOCIAL
NETWORKING
SITES
COMMONALITIES
323
THE
TOP
SOCIAL
NETWORKING
SITES
324
EXAMINING
SOCIAL
NETWORKING
SITES
326
FACEBOOK
326
NETWORK
OVERVIEW,
DISCOVERY
AND
EXPLORATION
INEXCEL
328
CONTENTS
XIII
GOOGLE+ 329
TWITTER
330
APPLICATION
PROGRAM
INTERFACE
AND
SOCIAL
MEDIA
CONTENT..
332
ONLINE
SOCIAL
VERSUS
PROFESSIONAL
NETWORKING
334
COMMON
BUSINESS
SOCIAL
NETWORKING
SITES
334
FINDING
INDIVIDUALS
ONSOCIAL
MEDIA
SITES
335
SOCIAL
MEDIA
EVIDENCE
COLLECTION
336
SOCIAL
NETWORKING
THROUGH
PHOTOGRAPHS
337
FLICKR
337
PHOTOBUCKET
338
SOCIAL
MEDIA
INVESTIGATIONS
POLICY
338
TRAINING
ONINVESTIGATING
SOCIAL
NETWORKS
339
CONCLUSION
339
FURTHER
READING
340
CHAPTER15
INVESTIGATINGMETHODSOFCOMMUNICATION
345
COMMUNICATING
ONTHEINTERNET..
345
CLIENT
SERVER:
PROTOCOLS
AND
TOOLS
345
INSTANT
MESSAGING
346
INTERNET
RELAY
CHAT
349
P2P:
PROTOCOLS
AND
TOOLS
358
BULLETIN
BOARDS
361
ONLINE
BULLETIN
BOARDS
367
CRAIGSLIST
367
CONCLUSION
369
FURTHER
READING
369
CHAPTER16
DETECTIONANDPREVENTIONOFINTERNETCRIMES
375
PERCEPTION
OFLAW
ENFORCEMENT
ONTHE
INTERNET..
375
CONTRIBUTING
FACTORS
TOTHEPROBLEM
376
LAW
ENFORCEMENT
SRESPONSE
TOINTERNET
CRIME
378
ARE
THERE
BROKEN
WINDOWS
INCYBERSPACE?
378
DETECTION
METHODS
379
METHODS
OFPREVENTION
382
HARD
PREVENTION:
USING
TECHNOLOGY
TOSTOP
INTERNET
CRIME
382
SOFT
PREVENTION:
EDUCATION
384
INVESTIGATOR
CYBERCRIME
EDUCATION
392
WHAT
CAN
YOU
DOTODETECT
AND
PREVENT
ONLINE
CRIME?
395
CONCLUSIONS
395
FURTHER
READING
396
XIV
CONTENTS
CHAPTER17 PUTTING
ITAL!TOGETHER
401
CONCEPTS
INACTION
401
BASIC
INTERNET
INVESTIGATIVE
STEPS
401
CASE
STUDIES
403
EBAY
FRAUD
SCENARIO
404
CRAIGSLIST
STOLEN
PROPERTY
SCENARIO
404
INTERNET
THREAT
TOCOMPANY
OFFICER
SCENARIO
405
CYBER-HARRASSMENT
SCENARIO
406
INTERNET
MURDER
SCENARIO
407
EMAIL
THREAT
SCENARIO
408
CONCLUSION
408
FURTHER
READING
409
CHAPTER18
EPILOGUE
411
APPENDICES
413
INDEX
.461
|
any_adam_object | 1 |
author | Shipley, Todd G. Bowker, Art |
author_facet | Shipley, Todd G. Bowker, Art |
author_role | aut aut |
author_sort | Shipley, Todd G. |
author_variant | t g s tg tgs a b ab |
building | Verbundindex |
bvnumber | BV041841281 |
classification_rvk | AP 15972 ST 277 |
classification_tum | DAT 614f DAT 055f |
ctrlnum | (OCoLC)881696644 (DE-599)BSZ396467490 |
discipline | Allgemeines Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01670nam a2200433 c 4500</leader><controlfield tag="001">BV041841281</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150512 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140512s2014 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124078178</subfield><subfield code="9">978-0-12-407817-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881696644</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ396467490</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 15972</subfield><subfield code="0">(DE-625)6968:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 614f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shipley, Todd G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Investigating internet crimes</subfield><subfield code="b">an introduction to solving crimes in cyberspace</subfield><subfield code="c">Todd G. Shipley ; Art Bowker</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIII, 472 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bowker, Art</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027285943&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027285943</subfield></datafield></record></collection> |
id | DE-604.BV041841281 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:06:40Z |
institution | BVB |
isbn | 9780124078178 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027285943 |
oclc_num | 881696644 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-11 |
physical | XXIII, 472 S. Ill., graph. Darst. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier |
record_format | marc |
spelling | Shipley, Todd G. Verfasser aut Investigating internet crimes an introduction to solving crimes in cyberspace Todd G. Shipley ; Art Bowker Amsterdam Elsevier 2014 XXIII, 472 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturangaben Internet (DE-588)4308416-3 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s DE-604 Internet (DE-588)4308416-3 s Computerkriminalität (DE-588)4010452-7 s Bowker, Art Verfasser aut SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027285943&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Shipley, Todd G. Bowker, Art Investigating internet crimes an introduction to solving crimes in cyberspace Internet (DE-588)4308416-3 gnd Computerkriminalität (DE-588)4010452-7 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4010452-7 (DE-588)7864395-8 |
title | Investigating internet crimes an introduction to solving crimes in cyberspace |
title_auth | Investigating internet crimes an introduction to solving crimes in cyberspace |
title_exact_search | Investigating internet crimes an introduction to solving crimes in cyberspace |
title_full | Investigating internet crimes an introduction to solving crimes in cyberspace Todd G. Shipley ; Art Bowker |
title_fullStr | Investigating internet crimes an introduction to solving crimes in cyberspace Todd G. Shipley ; Art Bowker |
title_full_unstemmed | Investigating internet crimes an introduction to solving crimes in cyberspace Todd G. Shipley ; Art Bowker |
title_short | Investigating internet crimes |
title_sort | investigating internet crimes an introduction to solving crimes in cyberspace |
title_sub | an introduction to solving crimes in cyberspace |
topic | Internet (DE-588)4308416-3 gnd Computerkriminalität (DE-588)4010452-7 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Internet Computerkriminalität Internetkriminalität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027285943&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT shipleytoddg investigatinginternetcrimesanintroductiontosolvingcrimesincyberspace AT bowkerart investigatinginternetcrimesanintroductiontosolvingcrimesincyberspace |