Cyber crime and cyber terrorism investigator's handbook:
Gespeichert in:
Weitere Verfasser: | , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, Massachusetts
Elsevier
2014
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (307 pages) |
ISBN: | 9780128008119 0128008113 0128007435 9780128007433 1306977339 9781306977333 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046098872 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190812s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128008119 |9 978-0-12-800811-9 | ||
020 | |a 0128008113 |9 0-12-800811-3 | ||
020 | |a 0128007435 |9 0-12-800743-5 | ||
020 | |a 9780128007433 |9 978-0-12-800743-3 | ||
020 | |a 1306977339 |9 1-306-97733-9 | ||
020 | |a 9781306977333 |9 978-1-306-97733-3 | ||
035 | |a (ZDB-4-ITC)ocn889268705 | ||
035 | |a (OCoLC)889268705 | ||
035 | |a (DE-599)BVBBV046098872 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 363.25/968 |2 23 | |
245 | 1 | 0 | |a Cyber crime and cyber terrorism investigator's handbook |c edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
264 | 1 | |a Waltham, Massachusetts |b Elsevier |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (307 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o | |
650 | 7 | |a BUSINESS & ECONOMICS / Infrastructure |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE / General |2 bisacsh | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 4 | |a Crime | |
650 | 4 | |a Internet | |
650 | 4 | |a Computer crimes |x Investigation |a Cyberterrorism |x Investigation |a Computer crimes |x Investigation |v Case studies |a Cyberterrorism |x Investigation |v Case studies | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 2 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Akhgar, Babak |4 edt | |
700 | 1 | |a Staniforth, Andrew |4 edt | |
700 | 1 | |a Bosco, Francesca M. |4 edt | |
700 | 1 | |a Elliot, Steve |4 edt | |
700 | 1 | |a Rearick, Benjamin |4 project director | |
700 | 1 | |a Kumaraguruparan, Priya |4 project director | |
700 | 1 | |a Rogers, Mark |4 dsr | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Cyber crime and cyber terrorism investigator's handbook |d Waltham, Massachusetts : Elsevier, ©2014 |h xxiii, 282 pages |z 9780128007433 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031479690 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804180404440137728 |
---|---|
any_adam_object | |
author2 | Akhgar, Babak Staniforth, Andrew Bosco, Francesca M. Elliot, Steve Rearick, Benjamin Kumaraguruparan, Priya Rogers, Mark |
author2_role | edt edt edt edt pdr pdr dsr |
author2_variant | b a ba a s as f m b fm fmb s e se b r br p k pk m r mr |
author_facet | Akhgar, Babak Staniforth, Andrew Bosco, Francesca M. Elliot, Steve Rearick, Benjamin Kumaraguruparan, Priya Rogers, Mark |
building | Verbundindex |
bvnumber | BV046098872 |
collection | ZDB-4-ITC |
contents | Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o |
ctrlnum | (ZDB-4-ITC)ocn889268705 (OCoLC)889268705 (DE-599)BVBBV046098872 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03291nmm a2200637zc 4500</leader><controlfield tag="001">BV046098872</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190812s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128008119</subfield><subfield code="9">978-0-12-800811-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128008113</subfield><subfield code="9">0-12-800811-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128007435</subfield><subfield code="9">0-12-800743-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128007433</subfield><subfield code="9">978-0-12-800743-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306977339</subfield><subfield code="9">1-306-97733-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306977333</subfield><subfield code="9">978-1-306-97733-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn889268705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)889268705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046098872</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber crime and cyber terrorism investigator's handbook</subfield><subfield code="c">edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (307 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Infrastructure</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="a">Cyberterrorism</subfield><subfield code="x">Investigation</subfield><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="v">Case studies</subfield><subfield code="a">Cyberterrorism</subfield><subfield code="x">Investigation</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Akhgar, Babak</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Staniforth, Andrew</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bosco, Francesca M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Elliot, Steve</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rearick, Benjamin</subfield><subfield code="4">project director</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumaraguruparan, Priya</subfield><subfield code="4">project director</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Mark</subfield><subfield code="4">dsr</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Cyber crime and cyber terrorism investigator's handbook</subfield><subfield code="d">Waltham, Massachusetts : Elsevier, ©2014</subfield><subfield code="h">xxiii, 282 pages</subfield><subfield code="z">9780128007433</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031479690</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV046098872 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:13Z |
institution | BVB |
isbn | 9780128008119 0128008113 0128007435 9780128007433 1306977339 9781306977333 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031479690 |
oclc_num | 889268705 |
open_access_boolean | |
physical | 1 online resource (307 pages) |
psigel | ZDB-4-ITC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier |
record_format | marc |
spelling | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers Waltham, Massachusetts Elsevier 2014 © 2014 1 online resource (307 pages) txt rdacontent c rdamedia cr rdacarrier Print version record Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation fast Crime Internet Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf (DE-588)4522595-3 Fallstudiensammlung gnd-content Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s Computerforensik (DE-588)4774034-6 s 1\p DE-604 Akhgar, Babak edt Staniforth, Andrew edt Bosco, Francesca M. edt Elliot, Steve edt Rearick, Benjamin project director Kumaraguruparan, Priya project director Rogers, Mark dsr Erscheint auch als Druck-Ausgabe Cyber crime and cyber terrorism investigator's handbook Waltham, Massachusetts : Elsevier, ©2014 xxiii, 282 pages 9780128007433 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cyber crime and cyber terrorism investigator's handbook Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation fast Crime Internet Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4774034-6 (DE-588)7864395-8 (DE-588)4522595-3 |
title | Cyber crime and cyber terrorism investigator's handbook |
title_auth | Cyber crime and cyber terrorism investigator's handbook |
title_exact_search | Cyber crime and cyber terrorism investigator's handbook |
title_full | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
title_fullStr | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
title_full_unstemmed | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
title_short | Cyber crime and cyber terrorism investigator's handbook |
title_sort | cyber crime and cyber terrorism investigator s handbook |
topic | BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation fast Crime Internet Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | BUSINESS & ECONOMICS / Infrastructure SOCIAL SCIENCE / General Computer crimes / Investigation Crime Internet Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit Computerforensik Internetkriminalität Fallstudiensammlung |
work_keys_str_mv | AT akhgarbabak cybercrimeandcyberterrorisminvestigatorshandbook AT staniforthandrew cybercrimeandcyberterrorisminvestigatorshandbook AT boscofrancescam cybercrimeandcyberterrorisminvestigatorshandbook AT elliotsteve cybercrimeandcyberterrorisminvestigatorshandbook AT rearickbenjamin cybercrimeandcyberterrorisminvestigatorshandbook AT kumaraguruparanpriya cybercrimeandcyberterrorisminvestigatorshandbook AT rogersmark cybercrimeandcyberterrorisminvestigatorshandbook |