Scene of the cybercrime: computer forensics handbook
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
©2002
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index "Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror |
Beschreibung: | 1 Online-Ressource (xxxi, 718 pages) |
ISBN: | 0080480780 1931836655 193226633X 9780080480787 9781931836654 9781932266337 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307304 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2002 |||| o||u| ||||||eng d | ||
020 | |a 0080480780 |9 0-08-048078-0 | ||
020 | |a 1931836655 |9 1-931836-65-5 | ||
020 | |a 193226633X |c electronic bk. |9 1-932266-33-X | ||
020 | |a 9780080480787 |9 978-0-08-048078-7 | ||
020 | |a 9781931836654 |9 978-1-931836-65-4 | ||
020 | |a 9781932266337 |c electronic bk. |9 978-1-932266-33-7 | ||
035 | |a (OCoLC)51555594 | ||
035 | |a (DE-599)BVBBV042307304 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8/2 |2 21 | |
100 | 1 | |a Shinder, Debra Littlejohn |e Verfasser |4 aut | |
245 | 1 | 0 | |a Scene of the cybercrime |b computer forensics handbook |c Debra Littlejohn Shinder ; Ed Tittel, technical editor |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c ©2002 | |
300 | |a 1 Online-Ressource (xxxi, 718 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a "Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computercriminaliteit |2 gtt | |
650 | 7 | |a Criminalistiek |2 gtt | |
650 | 4 | |a Computer security |v Handbooks, manuals, etc | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
650 | 4 | |a Computer crimes |x Investigation |v Handbooks, manuals, etc | |
650 | 4 | |a Forensic sciences |v Handbooks, manuals, etc | |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Gegenmaßnahme |0 (DE-588)4445317-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Gegenmaßnahme |0 (DE-588)4445317-6 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Tittel, Ed |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836654 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744296 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781931836654 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152892457746432 |
---|---|
any_adam_object | |
author | Shinder, Debra Littlejohn |
author_facet | Shinder, Debra Littlejohn |
author_role | aut |
author_sort | Shinder, Debra Littlejohn |
author_variant | d l s dl dls |
building | Verbundindex |
bvnumber | BV042307304 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)51555594 (DE-599)BVBBV042307304 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03414nmm a2200589zc 4500</leader><controlfield tag="001">BV042307304</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080480780</subfield><subfield code="9">0-08-048078-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836655</subfield><subfield code="9">1-931836-65-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">193226633X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-932266-33-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080480787</subfield><subfield code="9">978-0-08-048078-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836654</subfield><subfield code="9">978-1-931836-65-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266337</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-932266-33-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51555594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307304</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shinder, Debra Littlejohn</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Scene of the cybercrime</subfield><subfield code="b">computer forensics handbook</subfield><subfield code="c">Debra Littlejohn Shinder ; Ed Tittel, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxi, 718 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computercriminaliteit</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminalistiek</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Gegenmaßnahme</subfield><subfield code="0">(DE-588)4445317-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Gegenmaßnahme</subfield><subfield code="0">(DE-588)4445317-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tittel, Ed</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836654</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744296</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836654</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307304 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 0080480780 1931836655 193226633X 9780080480787 9781931836654 9781932266337 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744296 |
oclc_num | 51555594 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxxi, 718 pages) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Shinder, Debra Littlejohn Verfasser aut Scene of the cybercrime computer forensics handbook Debra Littlejohn Shinder ; Ed Tittel, technical editor Rockland, MA Syngress Pub. ©2002 1 Online-Ressource (xxxi, 718 pages) txt rdacontent c rdamedia cr rdacarrier Includes index "Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror COMPUTERS / Security / Cryptography bisacsh Computercriminaliteit gtt Criminalistiek gtt Computer security Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Computer crimes Investigation Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Gegenmaßnahme (DE-588)4445317-6 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s 1\p DE-604 Gegenmaßnahme (DE-588)4445317-6 s 2\p DE-604 Tittel, Ed Sonstige oth http://www.sciencedirect.com/science/book/9781931836654 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Shinder, Debra Littlejohn Scene of the cybercrime computer forensics handbook COMPUTERS / Security / Cryptography bisacsh Computercriminaliteit gtt Criminalistiek gtt Computer security Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Computer crimes Investigation Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Computerkriminalität (DE-588)4010452-7 gnd Gegenmaßnahme (DE-588)4445317-6 gnd |
subject_GND | (DE-588)4010452-7 (DE-588)4445317-6 |
title | Scene of the cybercrime computer forensics handbook |
title_auth | Scene of the cybercrime computer forensics handbook |
title_exact_search | Scene of the cybercrime computer forensics handbook |
title_full | Scene of the cybercrime computer forensics handbook Debra Littlejohn Shinder ; Ed Tittel, technical editor |
title_fullStr | Scene of the cybercrime computer forensics handbook Debra Littlejohn Shinder ; Ed Tittel, technical editor |
title_full_unstemmed | Scene of the cybercrime computer forensics handbook Debra Littlejohn Shinder ; Ed Tittel, technical editor |
title_short | Scene of the cybercrime |
title_sort | scene of the cybercrime computer forensics handbook |
title_sub | computer forensics handbook |
topic | COMPUTERS / Security / Cryptography bisacsh Computercriminaliteit gtt Criminalistiek gtt Computer security Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Computer crimes Investigation Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Computerkriminalität (DE-588)4010452-7 gnd Gegenmaßnahme (DE-588)4445317-6 gnd |
topic_facet | COMPUTERS / Security / Cryptography Computercriminaliteit Criminalistiek Computer security Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Computer crimes Investigation Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Computerkriminalität Gegenmaßnahme |
url | http://www.sciencedirect.com/science/book/9781931836654 |
work_keys_str_mv | AT shinderdebralittlejohn sceneofthecybercrimecomputerforensicshandbook AT titteled sceneofthecybercrimecomputerforensicshandbook |