Computer crime, investigation, and the law:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, Mass.
Course Technology PTR/Cengage Learning
c2011
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen Includes bibliographical references and index "If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description p |
Beschreibung: | 1 Online-Ressource (xvii, 499 p.) |
ISBN: | 1435455320 1435456106 9781435455320 9781435456105 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043141516 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2011 |||| o||u| ||||||eng d | ||
020 | |a 1435455320 |9 1-4354-5532-0 | ||
020 | |a 1435456106 |c eBook |9 1-4354-5610-6 | ||
020 | |a 9781435455320 |9 978-1-4354-5532-0 | ||
020 | |a 9781435456105 |c eBook |9 978-1-4354-5610-5 | ||
035 | |a (OCoLC)631017503 | ||
035 | |a (DE-599)BVBBV043141516 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 364.168 |2 22 | |
100 | 1 | |a Easttom, Chuck |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer crime, investigation, and the law |c Chuck Easttom, Jeffrey Taylor |
264 | 1 | |a Boston, Mass. |b Course Technology PTR/Cengage Learning |c c2011 | |
300 | |a 1 Online-Ressource (xvii, 499 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from title screen | ||
500 | |a Includes bibliographical references and index | ||
500 | |a "If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description p | ||
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 7 | |a Computer crimes |2 blmlsh | |
650 | 7 | |a Computer crimes / Investigation |2 blmlsh | |
650 | 7 | |a Computer crimes / Law and legislation |2 blmlsh | |
650 | 7 | |a Computer crimes |2 local | |
650 | 7 | |a Computer crimes / Investigation |2 local | |
650 | 7 | |a Computer crimes / Law and legislation |2 local | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Law and legislation |2 fast | |
650 | 4 | |a Recht | |
650 | 4 | |a Computer crimes |z United States | |
650 | 4 | |a Computer crimes |x Investigation |z United States | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet |x Law and legislation |z United States | |
651 | 4 | |a USA | |
700 | 1 | |a Taylor, Jeffrey |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=318532 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028565707 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=318532 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=318532 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175591093567488 |
---|---|
any_adam_object | |
author | Easttom, Chuck |
author_facet | Easttom, Chuck |
author_role | aut |
author_sort | Easttom, Chuck |
author_variant | c e ce |
building | Verbundindex |
bvnumber | BV043141516 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)631017503 (DE-599)BVBBV043141516 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03406nmm a2200601zc 4500</leader><controlfield tag="001">BV043141516</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435455320</subfield><subfield code="9">1-4354-5532-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435456106</subfield><subfield code="c">eBook</subfield><subfield code="9">1-4354-5610-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435455320</subfield><subfield code="9">978-1-4354-5532-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435456105</subfield><subfield code="c">eBook</subfield><subfield code="9">978-1-4354-5610-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)631017503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043141516</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Easttom, Chuck</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer crime, investigation, and the law</subfield><subfield code="c">Chuck Easttom, Jeffrey Taylor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, Mass.</subfield><subfield code="b">Course Technology PTR/Cengage Learning</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 499 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description p</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Law and legislation</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Law and legislation</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Taylor, Jeffrey</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=318532</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028565707</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=318532</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=318532</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043141516 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:43Z |
institution | BVB |
isbn | 1435455320 1435456106 9781435455320 9781435456105 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028565707 |
oclc_num | 631017503 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xvii, 499 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Course Technology PTR/Cengage Learning |
record_format | marc |
spelling | Easttom, Chuck Verfasser aut Computer crime, investigation, and the law Chuck Easttom, Jeffrey Taylor Boston, Mass. Course Technology PTR/Cengage Learning c2011 1 Online-Ressource (xvii, 499 p.) txt rdacontent c rdamedia cr rdacarrier Title from title screen Includes bibliographical references and index "If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description p TRUE CRIME / White Collar Crime bisacsh Computer crimes blmlsh Computer crimes / Investigation blmlsh Computer crimes / Law and legislation blmlsh Computer crimes local Computer crimes / Investigation local Computer crimes / Law and legislation local Computer crimes fast Computer crimes / Investigation fast Computer security fast Internet / Law and legislation fast Recht Computer crimes United States Computer crimes Investigation United States Computer security Internet Law and legislation United States USA Taylor, Jeffrey Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=318532 Aggregator Volltext |
spellingShingle | Easttom, Chuck Computer crime, investigation, and the law TRUE CRIME / White Collar Crime bisacsh Computer crimes blmlsh Computer crimes / Investigation blmlsh Computer crimes / Law and legislation blmlsh Computer crimes local Computer crimes / Investigation local Computer crimes / Law and legislation local Computer crimes fast Computer crimes / Investigation fast Computer security fast Internet / Law and legislation fast Recht Computer crimes United States Computer crimes Investigation United States Computer security Internet Law and legislation United States |
title | Computer crime, investigation, and the law |
title_auth | Computer crime, investigation, and the law |
title_exact_search | Computer crime, investigation, and the law |
title_full | Computer crime, investigation, and the law Chuck Easttom, Jeffrey Taylor |
title_fullStr | Computer crime, investigation, and the law Chuck Easttom, Jeffrey Taylor |
title_full_unstemmed | Computer crime, investigation, and the law Chuck Easttom, Jeffrey Taylor |
title_short | Computer crime, investigation, and the law |
title_sort | computer crime investigation and the law |
topic | TRUE CRIME / White Collar Crime bisacsh Computer crimes blmlsh Computer crimes / Investigation blmlsh Computer crimes / Law and legislation blmlsh Computer crimes local Computer crimes / Investigation local Computer crimes / Law and legislation local Computer crimes fast Computer crimes / Investigation fast Computer security fast Internet / Law and legislation fast Recht Computer crimes United States Computer crimes Investigation United States Computer security Internet Law and legislation United States |
topic_facet | TRUE CRIME / White Collar Crime Computer crimes Computer crimes / Investigation Computer crimes / Law and legislation Computer security Internet / Law and legislation Recht Computer crimes United States Computer crimes Investigation United States Internet Law and legislation United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=318532 |
work_keys_str_mv | AT easttomchuck computercrimeinvestigationandthelaw AT taylorjeffrey computercrimeinvestigationandthelaw |