Scene of the cybercrime: computer forensics handbook
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrim...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
© 2002
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | "Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 online resource (xxxi, 718 pages) illustrations |
ISBN: | 193226633X 9781932266337 9780080480787 0080480780 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124619 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2002 |||| o||u| ||||||eng d | ||
020 | |a 193226633X |9 1-932266-33-X | ||
020 | |a 9781932266337 |9 978-1-932266-33-7 | ||
020 | |a 9780080480787 |9 978-0-08-048078-7 | ||
020 | |a 0080480780 |9 0-08-048078-0 | ||
035 | |a (ZDB-33-ESD)ocm51555594 | ||
035 | |a (OCoLC)51555594 | ||
035 | |a (DE-599)BVBBV046124619 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8/2 |2 21 | |
100 | 1 | |a Shinder, Debra Littlejohn |e Verfasser |4 aut | |
245 | 1 | 0 | |a Scene of the cybercrime |b computer forensics handbook |c Debra Littlejohn Shinder ; Ed Tittel, technical editor |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c © 2002 | |
300 | |a 1 online resource (xxxi, 718 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a "Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Forensic sciences |2 fast | |
650 | 7 | |a Computercriminaliteit |2 gtt | |
650 | 7 | |a Criminalistiek |2 gtt | |
650 | 4 | |a Electronic books | |
650 | 4 | |a Computer security |v Handbooks, manuals, etc | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
650 | 4 | |a Computer crimes |x Investigation |v Handbooks, manuals, etc | |
650 | 4 | |a Forensic sciences |v Handbooks, manuals, etc | |
650 | 0 | 7 | |a Gegenmaßnahme |0 (DE-588)4445317-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Gegenmaßnahme |0 (DE-588)4445317-6 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Tittel, Ed |4 joint author | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1931836655 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781931836654 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836654 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505073 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781931836654 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442822213632 |
---|---|
any_adam_object | |
author | Shinder, Debra Littlejohn |
author_facet | Shinder, Debra Littlejohn |
author_role | aut |
author_sort | Shinder, Debra Littlejohn |
author_variant | d l s dl dls |
building | Verbundindex |
bvnumber | BV046124619 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm51555594 (OCoLC)51555594 (DE-599)BVBBV046124619 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03698nmm a2200637zc 4500</leader><controlfield tag="001">BV046124619</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">193226633X</subfield><subfield code="9">1-932266-33-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266337</subfield><subfield code="9">978-1-932266-33-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080480787</subfield><subfield code="9">978-0-08-048078-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080480780</subfield><subfield code="9">0-08-048078-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm51555594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51555594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124619</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shinder, Debra Littlejohn</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Scene of the cybercrime</subfield><subfield code="b">computer forensics handbook</subfield><subfield code="c">Debra Littlejohn Shinder ; Ed Tittel, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxi, 718 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Forensic sciences</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computercriminaliteit</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminalistiek</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic books</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Gegenmaßnahme</subfield><subfield code="0">(DE-588)4445317-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Gegenmaßnahme</subfield><subfield code="0">(DE-588)4445317-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tittel, Ed</subfield><subfield code="4">joint author</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1931836655</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781931836654</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836654</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505073</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836654</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124619 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 193226633X 9781932266337 9780080480787 0080480780 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505073 |
oclc_num | 51555594 |
open_access_boolean | |
physical | 1 online resource (xxxi, 718 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Shinder, Debra Littlejohn Verfasser aut Scene of the cybercrime computer forensics handbook Debra Littlejohn Shinder ; Ed Tittel, technical editor Rockland, MA Syngress Pub. © 2002 1 online resource (xxxi, 718 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references "Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans Christian Krüger, Deputy Secretary General of the Council of Europe Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime. 62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities. The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror COMPUTERS / Security / Cryptography bisacsh Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Forensic sciences fast Computercriminaliteit gtt Criminalistiek gtt Electronic books Computer security Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Computer crimes Investigation Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Gegenmaßnahme (DE-588)4445317-6 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s 1\p DE-604 Gegenmaßnahme (DE-588)4445317-6 s 2\p DE-604 Tittel, Ed joint author Erscheint auch als Druck-Ausgabe 1931836655 Erscheint auch als Druck-Ausgabe 9781931836654 http://www.sciencedirect.com/science/book/9781931836654 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Shinder, Debra Littlejohn Scene of the cybercrime computer forensics handbook COMPUTERS / Security / Cryptography bisacsh Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Forensic sciences fast Computercriminaliteit gtt Criminalistiek gtt Electronic books Computer security Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Computer crimes Investigation Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Gegenmaßnahme (DE-588)4445317-6 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4445317-6 (DE-588)4010452-7 |
title | Scene of the cybercrime computer forensics handbook |
title_auth | Scene of the cybercrime computer forensics handbook |
title_exact_search | Scene of the cybercrime computer forensics handbook |
title_full | Scene of the cybercrime computer forensics handbook Debra Littlejohn Shinder ; Ed Tittel, technical editor |
title_fullStr | Scene of the cybercrime computer forensics handbook Debra Littlejohn Shinder ; Ed Tittel, technical editor |
title_full_unstemmed | Scene of the cybercrime computer forensics handbook Debra Littlejohn Shinder ; Ed Tittel, technical editor |
title_short | Scene of the cybercrime |
title_sort | scene of the cybercrime computer forensics handbook |
title_sub | computer forensics handbook |
topic | COMPUTERS / Security / Cryptography bisacsh Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Forensic sciences fast Computercriminaliteit gtt Criminalistiek gtt Electronic books Computer security Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Computer crimes Investigation Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Gegenmaßnahme (DE-588)4445317-6 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | COMPUTERS / Security / Cryptography Computer crimes / Investigation Computer networks / Security measures Computer security Forensic sciences Computercriminaliteit Criminalistiek Electronic books Computer security Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Computer crimes Investigation Handbooks, manuals, etc Forensic sciences Handbooks, manuals, etc Gegenmaßnahme Computerkriminalität |
url | http://www.sciencedirect.com/science/book/9781931836654 |
work_keys_str_mv | AT shinderdebralittlejohn sceneofthecybercrimecomputerforensicshandbook AT titteled sceneofthecybercrimecomputerforensicshandbook |