Cyber crime and cyber terrorism investigator's handbook:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier
2014
Waltham, MA Syngress |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXIII, 282 S. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042109465 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 141008s2014 ne |||| 00||| eng d | ||
010 | |a 014017880 | ||
035 | |a (OCoLC)893086415 | ||
035 | |a (DE-599)BVBBV042109465 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a ne |c NL | ||
049 | |a DE-858 | ||
050 | 0 | |a HV8079.C65 | |
082 | 0 | |a 363.25/968 |2 23 | |
245 | 1 | 0 | |a Cyber crime and cyber terrorism investigator's handbook |c edited by Babak Akhgar... |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier |c 2014 | |
264 | 1 | |a Waltham, MA |b Syngress | |
300 | |a XXIII, 282 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Cyberterrorism |x Investigation | |
650 | 4 | |a Computer crimes |x Investigation |v Case studies | |
650 | 4 | |a Cyberterrorism |x Investigation |v Case studies | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 2 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Akhgar, Babak |e Sonstige |0 (DE-588)1051499909 |4 oth | |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027549928&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027549928 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804152578192179200 |
---|---|
adam_text | CYBER CRIME AND CYBER TERRORISM INVESTIGATOR S HANDBOOK
/ AKHGAR, BABAK.
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CYBERSPACE : THE NEW FRONTIER FOR POLICING?
CYBER TERRORISM
NEW AND EMERGING THREATS
POLICE INVESTIGATION PROCESSES
CYBER SPECIFICATIONS
HIGH-TECH INVESTIGATIONS
ANALYSING DIGITAL EVIDENCE
DIGITAL FORENSICS
UNDERSTANDING SITUATIONAL AWARENESS
TERRORIST USE OF THE INTERNET
CHILD EXPOLITATION
CYBERCRIME CLASSIFICATION
CYBER TERROISM CASE STUDIES
SMITH BIG DATA IN SECURITY
SOCIAL MEDIA AND BIG DATA
SOCIAL MEDIA AND ITS ROLE FOR LEAS
THE RISE OF CYBER LIABILITY INSURANCE
RESPONDING TO CYBER CRIME AND CYBER TERRORISM
EVOLUTION OF TETRA THROUGH THE INTEGRATION WITH A NUMBER OF
COMMUNICATION
PLATFORMS TO SUPPORT PUBLIC PROTECTION AND DISASTER RELIEF (PPDR)
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)1051499909 |
building | Verbundindex |
bvnumber | BV042109465 |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 |
callnumber-search | HV8079.C65 |
callnumber-sort | HV 48079 C65 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)893086415 (DE-599)BVBBV042109465 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01935nam a2200481 c 4500</leader><controlfield tag="001">BV042109465</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">141008s2014 ne |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">014017880</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)893086415</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042109465</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">ne</subfield><subfield code="c">NL</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-858</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8079.C65</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber crime and cyber terrorism investigator's handbook</subfield><subfield code="c">edited by Babak Akhgar...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIII, 282 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Investigation</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Akhgar, Babak</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1051499909</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027549928&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027549928</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV042109465 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:12:56Z |
institution | BVB |
language | English |
lccn | 014017880 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027549928 |
oclc_num | 893086415 |
open_access_boolean | |
owner | DE-858 |
owner_facet | DE-858 |
physical | XXIII, 282 S. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Syngress |
record_format | marc |
spelling | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar... Amsterdam [u.a.] Elsevier 2014 Waltham, MA Syngress XXIII, 282 S. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf (DE-588)4522595-3 Fallstudiensammlung gnd-content Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s Computerforensik (DE-588)4774034-6 s 1\p DE-604 Akhgar, Babak Sonstige (DE-588)1051499909 oth LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027549928&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cyber crime and cyber terrorism investigator's handbook Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd Internetkriminalität (DE-588)7864395-8 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7864395-8 (DE-588)4774034-6 (DE-588)4522595-3 |
title | Cyber crime and cyber terrorism investigator's handbook |
title_auth | Cyber crime and cyber terrorism investigator's handbook |
title_exact_search | Cyber crime and cyber terrorism investigator's handbook |
title_full | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar... |
title_fullStr | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar... |
title_full_unstemmed | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar... |
title_short | Cyber crime and cyber terrorism investigator's handbook |
title_sort | cyber crime and cyber terrorism investigator s handbook |
topic | Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd Internetkriminalität (DE-588)7864395-8 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit Internetkriminalität Computerforensik Fallstudiensammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027549928&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT akhgarbabak cybercrimeandcyberterrorisminvestigatorshandbook |