Dark world: a book on the deep dark web
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2024
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xxi, 280 Seiten Illustrationen, Diagramme |
ISBN: | 9781032518879 1032518871 9781032518893 1032518898 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV049513334 | ||
003 | DE-604 | ||
005 | 20240808 | ||
007 | t | ||
008 | 240123s2024 a||| b||| 00||| eng d | ||
020 | |a 9781032518879 |c hbk |9 978-1-032-51887-9 | ||
020 | |a 1032518871 |9 1-032-51887-1 | ||
020 | |a 9781032518893 |c pbk |9 978-1-032-51889-3 | ||
020 | |a 1032518898 |9 1-032-51889-8 | ||
035 | |a (OCoLC)1429572760 | ||
035 | |a (DE-599)BVBBV049513334 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-M382 |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Dark world |b a book on the deep dark web |c Atif Ali and Muhammad Qasim |
246 | 1 | 3 | |a Darkworld |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2024 | |
300 | |a xxi, 280 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Darknet |0 (DE-588)1062531973 |2 gnd |9 rswk-swf |
653 | 0 | |a Dark Web | |
653 | 0 | |a World Wide Web / Security measures | |
653 | 0 | |a Computer crimes / Investigation | |
653 | 0 | |a Internet clandestin | |
653 | 0 | |a Web / Sécurité / Mesures | |
653 | 0 | |a Criminalité informatique / Enquêtes | |
653 | 0 | |a Computer crimes / Investigation | |
653 | 0 | |a Dark Web | |
653 | 0 | |a World Wide Web / Security measures | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Darknet |0 (DE-588)1062531973 |D s |
689 | 0 | 2 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ali, Atif |d ca. 20./21. Jh. |e Sonstige |0 (DE-588)1334672997 |4 oth | |
700 | 1 | |a Qasim, Muhammad |e Sonstige |0 (DE-588)1334673896 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-000-98669-3 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034859332&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034859332 |
Datensatz im Suchindex
_version_ | 1815416251972845568 |
---|---|
adam_text |
Contents Aim.xviii Audience. xix Contributors. XX Acknowledgments. xxi Chapter 1 , , Cybersecurity and the Dark Web. 1 Introduction. 1 Cybercrime and Cybersecurity. 1 Cybercrime. 1 Cybersecurity. 3 Web and Its Levels.5 Web Levels.5 Web Categories. 5 The Consequences of Criminal Activity on the DW. 8 Trojan Horses, Worms, and Malware.9 Ransomware. 9 Distributed DoS
Attack. 10 Social Network (SN) Attacks. 12 Scareware. 12 Botnets and Zombies. 12 Key Hitches. 13 Categories of Crime. 13 DW Malicious Activities. 14 Malware Classification. 15 Cyberspace Malware Challenges. 15 Malware Analysis. 16 Static Analysis. 17 Dynamic Analysis. 17 Hybrid Analysis (Includes Both Techniques Above). 18 Malware Defensive Measure. 19 The DW and Emerging Criminal Threats. 19 Trafficking in Human Beings and Sexual Services. 19 Assassinations and Its Marketing.20 Terrorist and
DW. 21 Drug Transactions. 21 Pornography Industry.21 Child Pornography. 23 Methods and Challenges for Tracking Criminals on the DW. 23 Summary. 24 vii
viii Chapter 2 Contents A Guide to the Dark and Deep Web. 25 The Beginning of the Internet. 25 The Deep Web. 26 The Dark Web.28 Criminals. 29 Law Enforcement. 29 Privacy.30 Journalism. 31 Drugs and Illegal Substances. 31 Counterfeit Goods. 31 Stolen Information. 33 Hackers. 33 Summary.34 Chapter 3 Dark Web Access with Tor Browser. 35 Tor Browser. 35 Installing Tor on
Linux. 36 Tor Project Recommendation. 39 The Mysterious Wiki.42 Chapter 4 The Dark Web’s Perils. 43 Online Scams. 43 Avoiding the Risks of a Dark Web Market. 46 The Dark Web’s Perils.47 Access. 48 Use and Misuse. 49 The Truth about the Risks.49 Some General Dangers.49 Summary. 51 Chapter 5 Cybercrime on the Dark Web. 52 Categories of Cybercrime. 52 Computer Fraud. 52 Business Email Compromise. 53 Data
Infringe. 53 Denial-of-Service.54 Malware. 55 Email Account Compromise. 55 Phishing.56 Ransomware. 58 BadRabbit.60 Locky. 60
Contents ix NotPetya.60 Cyberterrorism. 61 Cyberwarfare. 63 Cyber Extortion. 64 Using the Dark Web for Cybercrime. 65 Drugs. 65 Human Trafficking, Sex Trade, and Pornography. 65 Weapons.66 Fake Documents. 67 ATM PIN Pad Skimmers and ATM Malware. 67 Counterfeit Currency.68 Data Dumps.68 Fake Websites.68 Exploit Kits. 69 Data Exfiltration.69 Cybercrime Profitability.70
Extortion. 71 Phishing. 71 Adverts. 72 Identity Theft by Using Login Information. 72 Premium-Rate SMS.72 Banking Malware.73 Money Laundering and Malware-as-a-Service.73 Exploit Writers. 74 Bot Herders. 74 Malware Writers. 74 Money Laundering. 74 Summary. 75 Chapter 6 Red Room Deep Web.77 What Is the Red Room Deep Web?. 78 What Is Available on the Red Room Deep Web?.79 Child Pornography.79 Murder.79
Rape.79 General Torture.79 Chat.80 How to Join the Red Room Deep Web?. 80 Red Room Deep Web Pricing Plans and Payment Methods.80 Is Accessing Red Room Deep Web Illegal?. 81 Why Is the Red Room Considered Non-Existent?. 81 Deep Web Links to Access the Red Room. 83
X Chapter 7 Contents Terrorist Acts on the Surface and Dark Web. 84 Introduction. 84 Terrorists’ Online Activities. 84 Propaganda. 85 Propaganda and Social Media.86 Propaganda and the Dark Web.86 Content of Propaganda. 86 Rhetorical Structures of Terrorist Websites. 86 Crime as a Service. 87 Communications. 87 Dark Web and Encrypted Communication. 88 Mail2Tor. 91 Signal. 91 Telegram. .'. 91 Surespot.92
Wickr. 93 Zello. 93 WhatsApp. 94 Kik. 94 Steganography, Internet Memes, and Watermarking. 95 TerroristCrypt. 95 Video Games. 95 Email Dead Dropping. 96 Cybersecurity in Voice Communication.96 Terrorist Media. 96 Social Media and Surface Web. 96 Twitter.96 YouTube.98 Facebook.98 Pinterest.98
Tumblr. 98 Instagram.98 Ask.fm. 98 Online Terrorist Recruitment. 98 Surface Web. 99 Social Media. 99 Websites and Chat Rooms on the Internet. 99 Video Games. 99 Covert Recruitment and Training.100 Cyberterrorism. 100 Concluding Remarks. 101 Chapter 8 Dark Web Markets. 102 Introduction. 102
Contents xi Dark Net Black Markets. 102 Characteristics and Features. 102 Goods and Services. 103 Multisignature or Trusted Markets. 104 Escrow Markets. 104 ‘Finish Early’ Markets. 104 Invite/Referral Markets. 104 Charges, Transactions, and Payments. 105 Cryptocurrencies. 105 Comparing Cryptocurrencies and Fiat Currencies. 105 Cryptocurrencies and Digital Currencies Differences. 106 How to Obtain Cryptocurrencies. 106 Mining. 106 Trading/Exchanging. 107 Popular Cryptocurrencies. 108 Bitcoin.108
Ethereum. 108 Litecoin. 109 Monero.109 Dash/Darkcoin. 110 Active Markets. 110 Wall Street Market. Ill Dream Market. 112 Nightmare Market. 112 Empire Market. 112 Point/T*chka Free Market. 112 Silk Road 3.1.112 Cannabis Growers and Merchants Cooperative (CGMC). 113 Berlusconi Market. 113 The Majestic Garden. 113 Hydra. 113
WayAway. 114 RuTor.114 Cannazon. 114 Active Vendor Shops. 114 CharlieUK. 114 DutchDrugz21.114 RechardSport. 115 EIHerbolario. 115 Gammagoblin-Pushing Taboo. 115 The Church-Jesus of Rave (JOR).115 TdYouTeam. 115 The French Connection.115 EU Cocaine. 115 GlassWerkz. 115
xii Contents Cocaine Market.115 ChemSpain. 116 MaghrebHashish.116 Vendors and Markets That Are Full of Dead or Scammed People.116 AlphaBay. 116 Agora.116 Evolution. 116 Hansa Market. 116 Outlaw Market. 117 Aero Market. 117 Libertas Market. 117 TheRealDeal Market. 117 Mercado Negro. 117 Valhalla (Silkkitie).118 Apple
Market. 118 Your Drug. 118 Stoned 100. 118 QualityKing. 119 Fight Club. 119 L33TER. 119 Agora Market and Forum. 119 Atlantis. 119 Caravan Marketplace.120 Darknet Heroes League.120 The RealDeal Market. 120 Sheep Marketplace. 120 Russian Anonymous Marketplace. 121 UK Guns and Ammo. 121 USA/EU Fake Document Store. 121 The Dark Web is a Market for Illegal Goods and
Services. 121 Drugs. 121 Weapons.121 Communication Channels for Terrorists. 122 Hacking. 122 Assassinations. 122 Fraud. 123 Fake IDs/Driving Licenses. 124 Illegal Wildlife Trade. 124 Child Porn.124 Malware for Sale. 125 Botnets. 125 BTC Laundry. 126 Information about Government and Celebrity Officials’ Secrets is Being Leaked. 127
Contents xiii BTC and Cryptocurrency Fraud. 127 Terrorism. 128 Policing the Dark Markets. 129 Expectations Over the Next Five Years. 129 Chapter 9 We Are Anonymous: We Do Not Forget We Do Not Forgive. 130 Project Chanology. 131 Operation Payback. 131 Operation Tunisia. 134 OpEgypt. 136 The HBGary Hack. 137 OpBART. 138 Occupy Wall Street. 139 Chapter 10 Hitman for Hire.141 The Con Artist of the Besa Mafia. 141 Russia’s Top Female Anticorruption Investigator was Shot and Killed in the Street. 148
Sinaloa Cartel Hitman.150 Dark Mambia. 150 Criminal Network. 150 The Black Mob. 152 Mara Salvatrucha . 153 Assassination Network. 153 Hitman from Murder Incorporated.155 Summary. 155 Chapter 11 The Positive and Evil Side of the Dark Web. 156 Onion Websites. 157 Dark Web Black Market Transactions Involving the Use of Bitcoin. 165 Chapter 12 Techniques for Analyzing Dark Web Content. 167 Introduction.167 Deep Web versus Surface Web. 167 Mechanisms of Conventional Web Crawlers. 168 Surfacing Deep Web
Content. 169 Data Extraction. 169 Schema Matching for Sources. 170 Data Selection. 170 Deep Web Websites Analysis. 170
Contents xiv A Deep Web Website Search Analysis’s Eligibility. 170 The Number of Deep Web Websites: An Analysis. 171 Deep Web Size Analysis. 172 Analyze the Types of Content. ;. 173 Analyze the Popularity of the Website.173 Log Analysis. 174 Summary. 176 Chapter 13 Information Extraction from Dark Web Contents and Logs. 178 Introduction. 178 Examining Web Content and Logs. 178 Web Content Analysis. 179 Benefits of Content Analysis. 180 Policy Guidelines for Log Analysis.182 Risk Assessment. 182 Risk Assessment and Mitigation Duties and Responsibilities.183 Risk
Mitigation. 184 Web Content Logs Are the Responsibility of the Person in Charge of Them.185 Log Analysis Tools. 185 Using the Hadoop Framework Has Many Benefits. 187 Analyzing Files. 187 Unstructured Data Analysis and Information Extraction.189 Summary. 191 Chapter 14 Dark Web Forensics. 192 Introduction. 192 The Basics of Forensic. 192 The Dark Web’s Crypto Market and Cryptocurrencies.194 Money Laundering and Cryptocurrencies. 196 ATMs for Bitcoin. 198 Bitcoin Mixers. 198 Monero. 198 Bitcoin Property
Exchanges. 199 Schemes for Laundering Cryptocurrency Exposed. 199 Bitcoin-Laundering Arrests. 199 BTC-e. 200 Models and Scope of Forensic Investigations. 201 Scope.202 Policy and Procedure Making. 202 Evidence Assessment. 203
Contents XV Evidence Acquisition. 203 Examination of Evidence.204 Documentation and Reporting. 205 Models for Digital Forensics. 205 Digital Forensics Model (Abstract).206 Investigative Model for Digital Forensics. 206 Process of Integrated Digital Investigation. 207 Forensic Toolkit.208 Anti-Forensics Analysis. 210 Search Engine Characteristics.210 Detection of Virtual Machines and Sandboxes. 210 Summary. 211 Chapter 15 Oslnt Opensource Intelligence. 212 Introduction. 212 Open-Source Intelligence. 212 Security Intelligence and Its Challenges.213 Dark Web Security Intelligence
Companies. 214 Cybercrime-as-a-Service. 214 Increasing the Return on Investment (ROI) for Cyber Weapons on the Dark Web. 215 Intelligence-Gathering Focus.215 Hacking-as-a-Service. 215 Stolen Intellectual Property. 215 For Sale: Exploits.216 Vulnerabilities for Sale. 216 Stolen Financial Data. 217 Campaigns for Spam and Phishing. 218 Threat Intelligence on the Dark Web and Its Value.218 Security Intelligence’s Challenges. 218 Monitoring Tools for Open-Source Intelligence. 219 Recon-Ng. 219 Maltego. 220 The Harvester. 221
Shodan. 222 Google Dorks.223 Data Gathering.225 Direct Conversations. 225 Chat Rooms. 226 Advanced Search Queries.226 Market Listings.227 The Difficulties of Collecting Data from the Dark Web. 227 Summary. 229
xvi Contents Chapter 16 Emerging Dark Web Trends and Mitigation Techniques. 230 Introduction. 230 Recent Dark Web Evolution. 230 Enhanced Security, Privacy, and Usability. 230 Improvements in User Interface Design.232 Trust-Based Markets. 233 Continuity. 234 Crime Patterns. 236 Terrorism on the Dark Web. 236 Money Laundering via Cryptocurrencies. 237 Botnets for Hire Are Increasingly Popular. 239 Growth of Hacking-as-a-Service. 239 Increased Malware for Sale Listings.240 The Black Market for Ivory and Rhino Horn. 240 Preferred Cryptocurrencies. 241 Stolen Data Listings for Sale. 241 Threat
Mapping. 242 Fortinet. 242 Norse. 243 Checkpoint. 243 FireEye. 244 Arbor Networks. 244 Threat Map by Kaspersky. 245 Akamai. 247 Trend Micro. 247 Cutting-Edge Mitigation Techniques. 247 Network Investigation Techniques. 248 Memex.248 Some Conventional Techniques. 249 Informants. 249 Operation Undercover. 249 Individuals’ Tracking. 250
Postal Interception. 250 Cyber Patrols. 251 Disruptions in Darknet Trade.252 Summary. 254 Chapter 17 The Dark Web’s Future. 255 What Does the Deep Web’s Future Hold for Us?. 255 Dark Web Currency. 256 The Tor Project. 256 Dark Web Markets.258 ZeroNet. 261
Contents xvii Public Interest in the Dark Web.262 Summary. 264 Chapter 18 Your Business on the Dark Web. 265 Business Companies.265 IT Professionals.267 Law Enforcement Agencies. 270 Cybersecurity Professionals. 272 Military Organizations.272 Summary. 272 Glossary. 274 Bibliography.277 Index. 280 |
adam_txt | |
any_adam_object | 1 |
any_adam_object_boolean | |
author_GND | (DE-588)1334672997 (DE-588)1334673896 |
building | Verbundindex |
bvnumber | BV049513334 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1429572760 (DE-599)BVBBV049513334 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008c 4500</leader><controlfield tag="001">BV049513334</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240808</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240123s2024 a||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032518879</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-032-51887-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1032518871</subfield><subfield code="9">1-032-51887-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032518893</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-032-51889-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1032518898</subfield><subfield code="9">1-032-51889-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1429572760</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049513334</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dark world</subfield><subfield code="b">a book on the deep dark web</subfield><subfield code="c">Atif Ali and Muhammad Qasim</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Darkworld</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 280 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Darknet</subfield><subfield code="0">(DE-588)1062531973</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Dark Web</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">World Wide Web / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet clandestin</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Web / Sécurité / Mesures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Criminalité informatique / Enquêtes</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Dark Web</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">World Wide Web / Security measures</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Darknet</subfield><subfield code="0">(DE-588)1062531973</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ali, Atif</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1334672997</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qasim, Muhammad</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1334673896</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-000-98669-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034859332&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034859332</subfield></datafield></record></collection> |
id | DE-604.BV049513334 |
illustrated | Illustrated |
index_date | 2024-07-03T23:23:32Z |
indexdate | 2024-11-11T09:04:11Z |
institution | BVB |
isbn | 9781032518879 1032518871 9781032518893 1032518898 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034859332 |
oclc_num | 1429572760 |
open_access_boolean | |
owner | DE-M382 DE-739 |
owner_facet | DE-M382 DE-739 |
physical | xxi, 280 Seiten Illustrationen, Diagramme |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press |
record_format | marc |
spelling | Dark world a book on the deep dark web Atif Ali and Muhammad Qasim Darkworld Boca Raton ; London ; New York CRC Press 2024 xxi, 280 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Internet (DE-588)4308416-3 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Darknet (DE-588)1062531973 gnd rswk-swf Dark Web World Wide Web / Security measures Computer crimes / Investigation Internet clandestin Web / Sécurité / Mesures Criminalité informatique / Enquêtes Internet (DE-588)4308416-3 s Darknet (DE-588)1062531973 s Computerkriminalität (DE-588)4010452-7 s DE-604 Ali, Atif ca. 20./21. Jh. Sonstige (DE-588)1334672997 oth Qasim, Muhammad Sonstige (DE-588)1334673896 oth Erscheint auch als Online-Ausgabe 978-1-000-98669-3 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034859332&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Dark world a book on the deep dark web Internet (DE-588)4308416-3 gnd Computerkriminalität (DE-588)4010452-7 gnd Darknet (DE-588)1062531973 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4010452-7 (DE-588)1062531973 |
title | Dark world a book on the deep dark web |
title_alt | Darkworld |
title_auth | Dark world a book on the deep dark web |
title_exact_search | Dark world a book on the deep dark web |
title_exact_search_txtP | Dark world a book on the deep dark web |
title_full | Dark world a book on the deep dark web Atif Ali and Muhammad Qasim |
title_fullStr | Dark world a book on the deep dark web Atif Ali and Muhammad Qasim |
title_full_unstemmed | Dark world a book on the deep dark web Atif Ali and Muhammad Qasim |
title_short | Dark world |
title_sort | dark world a book on the deep dark web |
title_sub | a book on the deep dark web |
topic | Internet (DE-588)4308416-3 gnd Computerkriminalität (DE-588)4010452-7 gnd Darknet (DE-588)1062531973 gnd |
topic_facet | Internet Computerkriminalität Darknet |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034859332&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT aliatif darkworldabookonthedeepdarkweb AT qasimmuhammad darkworldabookonthedeepdarkweb AT aliatif darkworld AT qasimmuhammad darkworld |