Introduction to cybercrime: computer crimes, laws, and policing in the 21st century
"Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government...international, national, state, and local. Provides accessible, comp...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Barbara, California ; Denver, Colorado
Praeger
2016
|
Schriftenreihe: | Praeger security international textbook
|
Schlagworte: | |
Online-Zugang: | DE-706 Volltext |
Zusammenfassung: | "Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government...international, national, state, and local. Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics Supplies examinations of both the domestic and international efforts to combat cybercrime Serves an ideal text for first-year undergraduate students in criminal justice programs"... |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (290 Seiten) Diagramme |
ISBN: | 9798400671999 |
DOI: | 10.5040/9798400671999 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049665399 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240425s2016 xxu|||| o||u| ||||||eng d | ||
020 | |a 9798400671999 |9 9798400671999 | ||
024 | 7 | |a 10.5040/9798400671999 |2 doi | |
035 | |a (ZDB-162-BCPS)9798400671999 | ||
035 | |a (OCoLC)1437879062 | ||
035 | |a (DE-599)BVBBV049665399 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-706 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 364.16/8 |2 23 | |
100 | 1 | |a Hill, Joshua B. |e Verfasser |0 (DE-588)1107800706 |4 aut | |
245 | 1 | 0 | |a Introduction to cybercrime |b computer crimes, laws, and policing in the 21st century |c Joshua B. Hill and Nancy E. Marion |
264 | 1 | |a Santa Barbara, California ; Denver, Colorado |b Praeger |c 2016 | |
300 | |a 1 Online-Ressource (290 Seiten) |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Praeger security international textbook | |
500 | |a Includes bibliographical references | ||
520 | |a "Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government...international, national, state, and local. Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics Supplies examinations of both the domestic and international efforts to combat cybercrime Serves an ideal text for first-year undergraduate students in criminal justice programs"... | ||
650 | 4 | |a COMPUTERS / Internet / Security / bisacsh | |
650 | 4 | |a LAW / Communications / bisacsh | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a COMPUTERS / Internet / Security | |
650 | 4 | |a LAW / Communications | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Marion, Nancy E. |d 1962- |e Verfasser |0 (DE-588)1016677707 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-4408-3274-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4408-3533-9 |
856 | 4 | 0 | |u https://doi.org/10.5040/9798400671999 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-162-BCPS | ||
966 | e | |u https://doi.org/10.5040/9798400671999 |l DE-706 |p ZDB-162-BCPS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805082220128370688 |
---|---|
adam_text | |
any_adam_object | |
author | Hill, Joshua B. Marion, Nancy E. 1962- |
author_GND | (DE-588)1107800706 (DE-588)1016677707 |
author_facet | Hill, Joshua B. Marion, Nancy E. 1962- |
author_role | aut aut |
author_sort | Hill, Joshua B. |
author_variant | j b h jb jbh n e m ne nem |
building | Verbundindex |
bvnumber | BV049665399 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-162-BCPS |
ctrlnum | (ZDB-162-BCPS)9798400671999 (OCoLC)1437879062 (DE-599)BVBBV049665399 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
doi_str_mv | 10.5040/9798400671999 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV049665399</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240425s2016 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798400671999</subfield><subfield code="9">9798400671999</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.5040/9798400671999</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-162-BCPS)9798400671999</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1437879062</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049665399</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hill, Joshua B.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1107800706</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to cybercrime</subfield><subfield code="b">computer crimes, laws, and policing in the 21st century</subfield><subfield code="c">Joshua B. Hill and Nancy E. Marion</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Barbara, California ; Denver, Colorado</subfield><subfield code="b">Praeger</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (290 Seiten)</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Praeger security international textbook</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government...international, national, state, and local. Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics Supplies examinations of both the domestic and international efforts to combat cybercrime Serves an ideal text for first-year undergraduate students in criminal justice programs"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Internet / Security / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">LAW / Communications / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Internet / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">LAW / Communications</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Marion, Nancy E.</subfield><subfield code="d">1962-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1016677707</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4408-3274-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4408-3533-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.5040/9798400671999</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-162-BCPS</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.5040/9798400671999</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-162-BCPS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049665399 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T07:29:12Z |
institution | BVB |
isbn | 9798400671999 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035008520 |
oclc_num | 1437879062 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (290 Seiten) Diagramme |
psigel | ZDB-162-BCPS |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Praeger |
record_format | marc |
series2 | Praeger security international textbook |
spelling | Hill, Joshua B. Verfasser (DE-588)1107800706 aut Introduction to cybercrime computer crimes, laws, and policing in the 21st century Joshua B. Hill and Nancy E. Marion Santa Barbara, California ; Denver, Colorado Praeger 2016 1 Online-Ressource (290 Seiten) Diagramme txt rdacontent c rdamedia cr rdacarrier Praeger security international textbook Includes bibliographical references "Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government...international, national, state, and local. Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics Supplies examinations of both the domestic and international efforts to combat cybercrime Serves an ideal text for first-year undergraduate students in criminal justice programs"... COMPUTERS / Internet / Security / bisacsh LAW / Communications / bisacsh Computer crimes Computer crimes Prevention Internet Security measures COMPUTERS / Internet / Security LAW / Communications Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s Internetkriminalität (DE-588)7864395-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Marion, Nancy E. 1962- Verfasser (DE-588)1016677707 aut Erscheint auch als Online-Ausgabe 978-1-4408-3274-1 Erscheint auch als Druck-Ausgabe 978-1-4408-3533-9 https://doi.org/10.5040/9798400671999 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Hill, Joshua B. Marion, Nancy E. 1962- Introduction to cybercrime computer crimes, laws, and policing in the 21st century COMPUTERS / Internet / Security / bisacsh LAW / Communications / bisacsh Computer crimes Computer crimes Prevention Internet Security measures COMPUTERS / Internet / Security LAW / Communications Computersicherheit (DE-588)4274324-2 gnd Internetkriminalität (DE-588)7864395-8 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7864395-8 (DE-588)4010452-7 |
title | Introduction to cybercrime computer crimes, laws, and policing in the 21st century |
title_auth | Introduction to cybercrime computer crimes, laws, and policing in the 21st century |
title_exact_search | Introduction to cybercrime computer crimes, laws, and policing in the 21st century |
title_full | Introduction to cybercrime computer crimes, laws, and policing in the 21st century Joshua B. Hill and Nancy E. Marion |
title_fullStr | Introduction to cybercrime computer crimes, laws, and policing in the 21st century Joshua B. Hill and Nancy E. Marion |
title_full_unstemmed | Introduction to cybercrime computer crimes, laws, and policing in the 21st century Joshua B. Hill and Nancy E. Marion |
title_short | Introduction to cybercrime |
title_sort | introduction to cybercrime computer crimes laws and policing in the 21st century |
title_sub | computer crimes, laws, and policing in the 21st century |
topic | COMPUTERS / Internet / Security / bisacsh LAW / Communications / bisacsh Computer crimes Computer crimes Prevention Internet Security measures COMPUTERS / Internet / Security LAW / Communications Computersicherheit (DE-588)4274324-2 gnd Internetkriminalität (DE-588)7864395-8 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | COMPUTERS / Internet / Security / bisacsh LAW / Communications / bisacsh Computer crimes Computer crimes Prevention Internet Security measures COMPUTERS / Internet / Security LAW / Communications Computersicherheit Internetkriminalität Computerkriminalität |
url | https://doi.org/10.5040/9798400671999 |
work_keys_str_mv | AT hilljoshuab introductiontocybercrimecomputercrimeslawsandpolicinginthe21stcentury AT marionnancye introductiontocybercrimecomputercrimeslawsandpolicinginthe21stcentury |