The lure: the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Course Technology PTR
© 2012
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 |
Beschreibung: | Includes index Looks at the sting operation used by the Dept. of Justice to catch Russian hackers who were gaining control of computers and stealing private data from victims in the United States Includes bibliographical references and index Speakeasy -- The investigation begins -- The lure -- The sting -- In custody -- PayPal -- A (not so) brief primer on National Security investigations -- The motion to suppress and preliminary skirmishing -- Preparing for trial -- The trial begins -- The download revisited -- The expert speaks -- The prosecution wraps up -- The defense case and the conclusion -- Sentencing and other aftermath -- Appendixes A-E. |
Beschreibung: | xx, 540 pages |
ISBN: | 9781435457133 1435457137 9781435457126 1435457129 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043786439 | ||
003 | DE-604 | ||
005 | 20180725 | ||
007 | cr|uuu---uuuuu | ||
008 | 160920s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781435457133 |9 978-1-4354-5713-3 | ||
020 | |a 1435457137 |9 1-4354-5713-7 | ||
020 | |a 9781435457126 |9 978-1-4354-5712-6 | ||
020 | |a 1435457129 |9 1-4354-5712-9 | ||
035 | |a (ZDB-4-EBA)ocn710992932 | ||
035 | |a (OCoLC)710992932 | ||
035 | |a (DE-599)BVBBV043786439 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 364.16/80973 |2 22 | |
100 | 1 | |a Schroeder, Steve |e Verfasser |4 aut | |
245 | 1 | 0 | |a The lure |b the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals |
264 | 1 | |a Boston |b Course Technology PTR |c © 2012 | |
300 | |a xx, 540 pages | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Looks at the sting operation used by the Dept. of Justice to catch Russian hackers who were gaining control of computers and stealing private data from victims in the United States | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Speakeasy -- The investigation begins -- The lure -- The sting -- In custody -- PayPal -- A (not so) brief primer on National Security investigations -- The motion to suppress and preliminary skirmishing -- Preparing for trial -- The trial begins -- The download revisited -- The expert speaks -- The prosecution wraps up -- The defense case and the conclusion -- Sentencing and other aftermath -- Appendixes A-E. | ||
610 | 1 | 4 | |a United States / Department of Justice |
610 | 1 | 7 | |a United States / Department of Justice |2 fast |
610 | 1 | 7 | |a United States / Department of Justice |2 sears |
610 | 2 | 4 | |a United States |b Department of Justice |
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer crimes / United States |2 sears | |
650 | 7 | |a Criminal investigation / United States |2 sears | |
650 | 7 | |a Computer security / United States |2 sears | |
650 | 4 | |a Computer crimes |x Investigation |z United States | |
650 | 4 | |a Computer security |z United States | |
651 | 4 | |a USA | |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029197498 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=356318 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=356318 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176622088093696 |
---|---|
any_adam_object | |
author | Schroeder, Steve |
author_facet | Schroeder, Steve |
author_role | aut |
author_sort | Schroeder, Steve |
author_variant | s s ss |
building | Verbundindex |
bvnumber | BV043786439 |
collection | ZDB-4-EBA |
ctrlnum | (ZDB-4-EBA)ocn710992932 (OCoLC)710992932 (DE-599)BVBBV043786439 |
dewey-full | 364.16/80973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/80973 |
dewey-search | 364.16/80973 |
dewey-sort | 3364.16 580973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02742nmm a2200553zc 4500</leader><controlfield tag="001">BV043786439</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180725 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160920s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435457133</subfield><subfield code="9">978-1-4354-5713-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435457137</subfield><subfield code="9">1-4354-5713-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435457126</subfield><subfield code="9">978-1-4354-5712-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435457129</subfield><subfield code="9">1-4354-5712-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn710992932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)710992932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043786439</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/80973</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schroeder, Steve</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The lure</subfield><subfield code="b">the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Course Technology PTR</subfield><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 540 pages</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Looks at the sting operation used by the Dept. of Justice to catch Russian hackers who were gaining control of computers and stealing private data from victims in the United States</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Speakeasy -- The investigation begins -- The lure -- The sting -- In custody -- PayPal -- A (not so) brief primer on National Security investigations -- The motion to suppress and preliminary skirmishing -- Preparing for trial -- The trial begins -- The download revisited -- The expert speaks -- The prosecution wraps up -- The defense case and the conclusion -- Sentencing and other aftermath -- Appendixes A-E.</subfield></datafield><datafield tag="610" ind1="1" ind2="4"><subfield code="a">United States / Department of Justice</subfield></datafield><datafield tag="610" ind1="1" ind2="7"><subfield code="a">United States / Department of Justice</subfield><subfield code="2">fast</subfield></datafield><datafield tag="610" ind1="1" ind2="7"><subfield code="a">United States / Department of Justice</subfield><subfield code="2">sears</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="b">Department of Justice</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / United States</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal investigation / United States</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / United States</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029197498</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=356318</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=356318</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043786439 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:35:06Z |
institution | BVB |
isbn | 9781435457133 1435457137 9781435457126 1435457129 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029197498 |
oclc_num | 710992932 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | xx, 540 pages |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Course Technology PTR |
record_format | marc |
spelling | Schroeder, Steve Verfasser aut The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals Boston Course Technology PTR © 2012 xx, 540 pages txt rdacontent c rdamedia cr rdacarrier Includes index Looks at the sting operation used by the Dept. of Justice to catch Russian hackers who were gaining control of computers and stealing private data from victims in the United States Includes bibliographical references and index Speakeasy -- The investigation begins -- The lure -- The sting -- In custody -- PayPal -- A (not so) brief primer on National Security investigations -- The motion to suppress and preliminary skirmishing -- Preparing for trial -- The trial begins -- The download revisited -- The expert speaks -- The prosecution wraps up -- The defense case and the conclusion -- Sentencing and other aftermath -- Appendixes A-E. United States / Department of Justice United States / Department of Justice fast United States / Department of Justice sears United States Department of Justice TRUE CRIME / White Collar Crime bisacsh Computer crimes / Investigation fast Computer security fast Computer crimes / United States sears Criminal investigation / United States sears Computer security / United States sears Computer crimes Investigation United States Computer security United States USA |
spellingShingle | Schroeder, Steve The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals United States / Department of Justice United States / Department of Justice fast United States / Department of Justice sears United States Department of Justice TRUE CRIME / White Collar Crime bisacsh Computer crimes / Investigation fast Computer security fast Computer crimes / United States sears Criminal investigation / United States sears Computer security / United States sears Computer crimes Investigation United States Computer security United States |
title | The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals |
title_auth | The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals |
title_exact_search | The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals |
title_full | The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals |
title_fullStr | The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals |
title_full_unstemmed | The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals |
title_short | The lure |
title_sort | the lure the true story of how the department of justice brought down two of the world s most dangerous cyber criminals |
title_sub | the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals |
topic | United States / Department of Justice United States / Department of Justice fast United States / Department of Justice sears United States Department of Justice TRUE CRIME / White Collar Crime bisacsh Computer crimes / Investigation fast Computer security fast Computer crimes / United States sears Criminal investigation / United States sears Computer security / United States sears Computer crimes Investigation United States Computer security United States |
topic_facet | United States / Department of Justice United States Department of Justice TRUE CRIME / White Collar Crime Computer crimes / Investigation Computer security Computer crimes / United States Criminal investigation / United States Computer security / United States Computer crimes Investigation United States Computer security United States USA |
work_keys_str_mv | AT schroedersteve thelurethetruestoryofhowthedepartmentofjusticebroughtdowntwooftheworldsmostdangerouscybercriminals |