Cyber Crime and Cyber Terrorism Investigator's Handbook:
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concern...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Schlagworte: | |
Zusammenfassung: | Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime. Written by experts in cyber crime, digital investigations, and counter-terrorismLearn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigatorsKeep up to date on current national and international law regarding cyber crime and cyber terrorismSee just how significant cyber crime has become, and how important cyber law enforcement is in the modern world |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (307 pages) |
ISBN: | 9780128008119 9780128007433 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043611038 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128008119 |9 978-0-12-800811-9 | ||
020 | |a 9780128007433 |c Print |9 978-0-12-800743-3 | ||
035 | |a (ZDB-30-PQE)EBC1744499 | ||
035 | |a (ZDB-89-EBL)EBL1744499 | ||
035 | |a (ZDB-38-EBR)ebr10896655 | ||
035 | |a (OCoLC)889268705 | ||
035 | |a (DE-599)BVBBV043611038 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 363.25968 | |
100 | 1 | |a Akhgar, Babak |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber Crime and Cyber Terrorism Investigator's Handbook |
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (307 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime. Written by experts in cyber crime, digital investigations, and counter-terrorismLearn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigatorsKeep up to date on current national and international law regarding cyber crime and cyber terrorismSee just how significant cyber crime has become, and how important cyber law enforcement is in the modern world | ||
650 | 4 | |a Computer crimes -- Investigation -- Case studies | |
650 | 4 | |a Computer crimes -- Investigation | |
650 | 4 | |a Cyberterrorism -- Investigation -- Case studies | |
650 | 4 | |a Cyberterrorism -- Investigation | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 2 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Staniforth, Andrew |e Sonstige |4 oth | |
700 | 1 | |a Bosco, Francesca |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Akhgar, Babak |t Cyber Crime and Cyber Terrorism Investigator's Handbook |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029025097 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176356132519936 |
---|---|
any_adam_object | |
author | Akhgar, Babak |
author_facet | Akhgar, Babak |
author_role | aut |
author_sort | Akhgar, Babak |
author_variant | b a ba |
building | Verbundindex |
bvnumber | BV043611038 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1744499 (ZDB-89-EBL)EBL1744499 (ZDB-38-EBR)ebr10896655 (OCoLC)889268705 (DE-599)BVBBV043611038 |
dewey-full | 363.25968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25968 |
dewey-search | 363.25968 |
dewey-sort | 3363.25968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03826nmm a2200541zc 4500</leader><controlfield tag="001">BV043611038</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128008119</subfield><subfield code="9">978-0-12-800811-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128007433</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-800743-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1744499</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1744499</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10896655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)889268705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043611038</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25968</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Akhgar, Babak</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Crime and Cyber Terrorism Investigator's Handbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (307 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime. Written by experts in cyber crime, digital investigations, and counter-terrorismLearn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigatorsKeep up to date on current national and international law regarding cyber crime and cyber terrorismSee just how significant cyber crime has become, and how important cyber law enforcement is in the modern world</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes -- Investigation -- Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes -- Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism -- Investigation -- Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism -- Investigation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Staniforth, Andrew</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bosco, Francesca</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Akhgar, Babak</subfield><subfield code="t">Cyber Crime and Cyber Terrorism Investigator's Handbook</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029025097</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV043611038 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:53Z |
institution | BVB |
isbn | 9780128008119 9780128007433 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029025097 |
oclc_num | 889268705 |
open_access_boolean | |
physical | 1 online resource (307 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Akhgar, Babak Verfasser aut Cyber Crime and Cyber Terrorism Investigator's Handbook Saint Louis Elsevier Science 2014 © 2014 1 online resource (307 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime. Written by experts in cyber crime, digital investigations, and counter-terrorismLearn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigatorsKeep up to date on current national and international law regarding cyber crime and cyber terrorismSee just how significant cyber crime has become, and how important cyber law enforcement is in the modern world Computer crimes -- Investigation -- Case studies Computer crimes -- Investigation Cyberterrorism -- Investigation -- Case studies Cyberterrorism -- Investigation Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf (DE-588)4522595-3 Fallstudiensammlung gnd-content Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s Computerforensik (DE-588)4774034-6 s 1\p DE-604 Staniforth, Andrew Sonstige oth Bosco, Francesca Sonstige oth Erscheint auch als Druck-Ausgabe Akhgar, Babak Cyber Crime and Cyber Terrorism Investigator's Handbook 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Akhgar, Babak Cyber Crime and Cyber Terrorism Investigator's Handbook Computer crimes -- Investigation -- Case studies Computer crimes -- Investigation Cyberterrorism -- Investigation -- Case studies Cyberterrorism -- Investigation Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4774034-6 (DE-588)7864395-8 (DE-588)4522595-3 |
title | Cyber Crime and Cyber Terrorism Investigator's Handbook |
title_auth | Cyber Crime and Cyber Terrorism Investigator's Handbook |
title_exact_search | Cyber Crime and Cyber Terrorism Investigator's Handbook |
title_full | Cyber Crime and Cyber Terrorism Investigator's Handbook |
title_fullStr | Cyber Crime and Cyber Terrorism Investigator's Handbook |
title_full_unstemmed | Cyber Crime and Cyber Terrorism Investigator's Handbook |
title_short | Cyber Crime and Cyber Terrorism Investigator's Handbook |
title_sort | cyber crime and cyber terrorism investigator s handbook |
topic | Computer crimes -- Investigation -- Case studies Computer crimes -- Investigation Cyberterrorism -- Investigation -- Case studies Cyberterrorism -- Investigation Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Computer crimes -- Investigation -- Case studies Computer crimes -- Investigation Cyberterrorism -- Investigation -- Case studies Cyberterrorism -- Investigation Computersicherheit Computerforensik Internetkriminalität Fallstudiensammlung |
work_keys_str_mv | AT akhgarbabak cybercrimeandcyberterrorisminvestigatorshandbook AT staniforthandrew cybercrimeandcyberterrorisminvestigatorshandbook AT boscofrancesca cybercrimeandcyberterrorisminvestigatorshandbook |