Computer crime, investigation, and the law:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, Mass.
Course Technology PTR/Cengage Learning
2011
|
Schlagworte: | |
Beschreibung: | 1 online resource (xvii, 499 pages) illustrations |
ISBN: | 1435456106 9781435456105 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045348868 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2011 |||| o||u| ||||||eng d | ||
020 | |a 1435456106 |9 1-4354-5610-6 | ||
020 | |a 9781435456105 |9 978-1-4354-5610-5 | ||
035 | |a (ZDB-4-ITC)ocn631017503 | ||
035 | |a (OCoLC)631017503 | ||
035 | |a (DE-599)BVBBV045348868 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 364.168 |2 22 | |
100 | 1 | |a Easttom, Chuck |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer crime, investigation, and the law |c Chuck Easttom, Jeffrey Taylor |
264 | 1 | |a Boston, Mass. |b Course Technology PTR/Cengage Learning |c 2011 | |
300 | |a 1 online resource (xvii, 499 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a "If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description page | |
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 7 | |a Computer crimes |2 blmlsh | |
650 | 7 | |a Computer crimes / Investigation |2 blmlsh | |
650 | 7 | |a Computer crimes / Law and legislation |2 blmlsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Law and legislation |2 fast | |
650 | 4 | |a Computer crimes |z United States |a Computer crimes |x Investigation |z United States |a Computer security |a Internet |x Law and legislation |z United States | |
700 | 1 | |a Taylor, Jeffrey |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Easttom, Chuck |t Computer crime, investigation, and the law |d Boston, MA : Course Technology, 2011 |z 9781435455320 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735522 |
Datensatz im Suchindex
_version_ | 1804179172286791680 |
---|---|
any_adam_object | |
author | Easttom, Chuck |
author_facet | Easttom, Chuck |
author_role | aut |
author_sort | Easttom, Chuck |
author_variant | c e ce |
building | Verbundindex |
bvnumber | BV045348868 |
collection | ZDB-4-ITC |
contents | "If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description page |
ctrlnum | (ZDB-4-ITC)ocn631017503 (OCoLC)631017503 (DE-599)BVBBV045348868 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02699nmm a2200433zc 4500</leader><controlfield tag="001">BV045348868</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435456106</subfield><subfield code="9">1-4354-5610-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435456105</subfield><subfield code="9">978-1-4354-5610-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn631017503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)631017503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348868</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Easttom, Chuck</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer crime, investigation, and the law</subfield><subfield code="c">Chuck Easttom, Jeffrey Taylor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, Mass.</subfield><subfield code="b">Course Technology PTR/Cengage Learning</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 499 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Law and legislation</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="z">United States</subfield><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="z">United States</subfield><subfield code="a">Computer security</subfield><subfield code="a">Internet</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Taylor, Jeffrey</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Easttom, Chuck</subfield><subfield code="t">Computer crime, investigation, and the law</subfield><subfield code="d">Boston, MA : Course Technology, 2011</subfield><subfield code="z">9781435455320</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735522</subfield></datafield></record></collection> |
id | DE-604.BV045348868 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:38Z |
institution | BVB |
isbn | 1435456106 9781435456105 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735522 |
oclc_num | 631017503 |
open_access_boolean | |
physical | 1 online resource (xvii, 499 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Course Technology PTR/Cengage Learning |
record_format | marc |
spelling | Easttom, Chuck Verfasser aut Computer crime, investigation, and the law Chuck Easttom, Jeffrey Taylor Boston, Mass. Course Technology PTR/Cengage Learning 2011 1 online resource (xvii, 499 pages) illustrations txt rdacontent c rdamedia cr rdacarrier "If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description page TRUE CRIME / White Collar Crime bisacsh Computer crimes blmlsh Computer crimes / Investigation blmlsh Computer crimes / Law and legislation blmlsh Computer crimes fast Computer crimes / Investigation fast Computer security fast Internet / Law and legislation fast Computer crimes United States Computer crimes Investigation United States Computer security Internet Law and legislation United States Taylor, Jeffrey Sonstige oth Erscheint auch als Druck-Ausgabe Easttom, Chuck Computer crime, investigation, and the law Boston, MA : Course Technology, 2011 9781435455320 |
spellingShingle | Easttom, Chuck Computer crime, investigation, and the law "If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes"--Resource description page TRUE CRIME / White Collar Crime bisacsh Computer crimes blmlsh Computer crimes / Investigation blmlsh Computer crimes / Law and legislation blmlsh Computer crimes fast Computer crimes / Investigation fast Computer security fast Internet / Law and legislation fast Computer crimes United States Computer crimes Investigation United States Computer security Internet Law and legislation United States |
title | Computer crime, investigation, and the law |
title_auth | Computer crime, investigation, and the law |
title_exact_search | Computer crime, investigation, and the law |
title_full | Computer crime, investigation, and the law Chuck Easttom, Jeffrey Taylor |
title_fullStr | Computer crime, investigation, and the law Chuck Easttom, Jeffrey Taylor |
title_full_unstemmed | Computer crime, investigation, and the law Chuck Easttom, Jeffrey Taylor |
title_short | Computer crime, investigation, and the law |
title_sort | computer crime investigation and the law |
topic | TRUE CRIME / White Collar Crime bisacsh Computer crimes blmlsh Computer crimes / Investigation blmlsh Computer crimes / Law and legislation blmlsh Computer crimes fast Computer crimes / Investigation fast Computer security fast Internet / Law and legislation fast Computer crimes United States Computer crimes Investigation United States Computer security Internet Law and legislation United States |
topic_facet | TRUE CRIME / White Collar Crime Computer crimes Computer crimes / Investigation Computer crimes / Law and legislation Computer security Internet / Law and legislation Computer crimes United States Computer crimes Investigation United States Computer security Internet Law and legislation United States |
work_keys_str_mv | AT easttomchuck computercrimeinvestigationandthelaw AT taylorjeffrey computercrimeinvestigationandthelaw |