Investigating Information-Based Crimes :: a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets.
This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predomina...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Springfield :
Charles C Thomas,
2013.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging "shadow" financial domain. This includes the new world of "smartphones," prepaid. |
Beschreibung: | 1 online resource (227 pages) |
Bibliographie: | Includes bibliographical references (pages 199-205) and index. |
ISBN: | 9780398088729 0398088721 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn828793784 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 130302s2013 xx ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d YDXCP |d BAL |d DEBSZ |d N$T |d E7B |d OCLCF |d OCLCQ |d OCLCO |d OCLCQ |d Z5A |d AGLDB |d OCLCQ |d VNS |d VTS |d M8D |d YDX |d OCLCA |d OCLCQ |d OCLCA |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 958718930 |a 1101650883 | ||
020 | |a 9780398088729 |q (electronic bk.) | ||
020 | |a 0398088721 |q (electronic bk.) | ||
020 | |z 0398088713 | ||
020 | |z 9780398088712 | ||
035 | |a (OCoLC)828793784 |z (OCoLC)958718930 |z (OCoLC)1101650883 | ||
050 | 4 | |a HV8079 |b .C65 2013eb | |
072 | 7 | |a BUS |x 032000 |2 bisacsh | |
072 | 7 | |a SOC |x 000000 |2 bisacsh | |
082 | 7 | |a 363.2 |a 363.25968 | |
049 | |a MAIN | ||
100 | 1 | |a Mendell, Ronald L. |0 http://id.loc.gov/authorities/names/n94002556 | |
245 | 1 | 0 | |a Investigating Information-Based Crimes : |b a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |
260 | |a Springfield : |b Charles C Thomas, |c 2013. | ||
300 | |a 1 online resource (227 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Chapter 1 -- IDENTITY THEFT; Chapter 2 -- SOCIAL ENGINEERING; Chapter 3 -- DISINFORMATION; Chapter 4 -- DIGITAL EVIDENCE ANDDIGITAL REPOSITORIES; Chapter 5 -- THE THEFT OF PERSONALINFORMATION REPOSITORIES; Chapter 6 -- MISUSE OF ONLINE INFORMATION; Chapter 7 -- MISUSE OF ELECTRONIC SURVEILLANCE; Chapter 8 -- THEFT OF PHYSICAL INFORMATION ASSETS; Chapter 9 -- PSYCHOLOGICAL DIMENSIONS; Chapter 10 -- THE FUTURE OFINFORMATION-BASED CRIMES; Appendix A; Appendix B; Appendix C; GLOSSARY; BIBLIOGRAPHY. | |
520 | |a This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging "shadow" financial domain. This includes the new world of "smartphones," prepaid. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references (pages 199-205) and index. | ||
650 | 0 | |a Computer crimes |x Investigation. |0 http://id.loc.gov/authorities/subjects/sh85029493 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 0 | |a Confidential communications. |0 http://id.loc.gov/authorities/subjects/sh85030929 | |
650 | 0 | |a Criminal investigation. |0 http://id.loc.gov/authorities/subjects/sh85034045 | |
650 | 6 | |a Criminalité informatique |x Enquêtes. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 6 | |a Secret professionnel. | |
650 | 6 | |a Enquêtes criminelles. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Infrastructure. |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
650 | 7 | |a Confidential communications |2 fast | |
650 | 7 | |a Criminal investigation |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Strafverfolgung |2 gnd | |
650 | 7 | |a Computerkriminalität |2 gnd | |
650 | 7 | |a Identität |2 gnd |0 http://d-nb.info/gnd/4026482-8 | |
650 | 7 | |a Datenmissbrauch |2 gnd | |
650 | 7 | |a Persönlichkeitsrecht |2 gnd |0 http://d-nb.info/gnd/4045245-1 | |
650 | 7 | |a Datenschutz |2 gnd | |
651 | 7 | |a USA |2 gnd | |
758 | |i has work: |a Investigating Information-Based Crimes (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH7mh3XpvW6Gyfdq4r8xQq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Mendell, Ronald L. |t Investigating Information-Based Crimes : A Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |d Springfield : Charles C Thomas, ©2013 |z 9780398088712 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=545566 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL1123391 | ||
938 | |a ebrary |b EBRY |n ebr10864797 | ||
938 | |a EBSCOhost |b EBSC |n 545566 | ||
938 | |a YBP Library Services |b YANK |n 10245788 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn828793784 |
---|---|
_version_ | 1816882223715975168 |
adam_text | |
any_adam_object | |
author | Mendell, Ronald L. |
author_GND | http://id.loc.gov/authorities/names/n94002556 |
author_facet | Mendell, Ronald L. |
author_role | |
author_sort | Mendell, Ronald L. |
author_variant | r l m rl rlm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079 .C65 2013eb |
callnumber-search | HV8079 .C65 2013eb |
callnumber-sort | HV 48079 C65 42013EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Chapter 1 -- IDENTITY THEFT; Chapter 2 -- SOCIAL ENGINEERING; Chapter 3 -- DISINFORMATION; Chapter 4 -- DIGITAL EVIDENCE ANDDIGITAL REPOSITORIES; Chapter 5 -- THE THEFT OF PERSONALINFORMATION REPOSITORIES; Chapter 6 -- MISUSE OF ONLINE INFORMATION; Chapter 7 -- MISUSE OF ELECTRONIC SURVEILLANCE; Chapter 8 -- THEFT OF PHYSICAL INFORMATION ASSETS; Chapter 9 -- PSYCHOLOGICAL DIMENSIONS; Chapter 10 -- THE FUTURE OFINFORMATION-BASED CRIMES; Appendix A; Appendix B; Appendix C; GLOSSARY; BIBLIOGRAPHY. |
ctrlnum | (OCoLC)828793784 |
dewey-full | 363.2 363.25968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.2 363.25968 |
dewey-search | 363.2 363.25968 |
dewey-sort | 3363.2 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04486cam a2200721Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn828793784</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">130302s2013 xx ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">BAL</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">Z5A</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VNS</subfield><subfield code="d">VTS</subfield><subfield code="d">M8D</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">958718930</subfield><subfield code="a">1101650883</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780398088729</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0398088721</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0398088713</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780398088712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)828793784</subfield><subfield code="z">(OCoLC)958718930</subfield><subfield code="z">(OCoLC)1101650883</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079</subfield><subfield code="b">.C65 2013eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.2</subfield><subfield code="a">363.25968</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mendell, Ronald L.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94002556</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Investigating Information-Based Crimes :</subfield><subfield code="b">a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Springfield :</subfield><subfield code="b">Charles C Thomas,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (227 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1 -- IDENTITY THEFT; Chapter 2 -- SOCIAL ENGINEERING; Chapter 3 -- DISINFORMATION; Chapter 4 -- DIGITAL EVIDENCE ANDDIGITAL REPOSITORIES; Chapter 5 -- THE THEFT OF PERSONALINFORMATION REPOSITORIES; Chapter 6 -- MISUSE OF ONLINE INFORMATION; Chapter 7 -- MISUSE OF ELECTRONIC SURVEILLANCE; Chapter 8 -- THEFT OF PHYSICAL INFORMATION ASSETS; Chapter 9 -- PSYCHOLOGICAL DIMENSIONS; Chapter 10 -- THE FUTURE OFINFORMATION-BASED CRIMES; Appendix A; Appendix B; Appendix C; GLOSSARY; BIBLIOGRAPHY.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging "shadow" financial domain. This includes the new world of "smartphones," prepaid.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 199-205) and index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029493</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85030929</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034045</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Enquêtes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Secret professionnel.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Enquêtes criminelles.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Infrastructure.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Confidential communications</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Strafverfolgung</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identität</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4026482-8</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Datenmissbrauch</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Persönlichkeitsrecht</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4045245-1</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Investigating Information-Based Crimes (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH7mh3XpvW6Gyfdq4r8xQq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Mendell, Ronald L.</subfield><subfield code="t">Investigating Information-Based Crimes : A Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets.</subfield><subfield code="d">Springfield : Charles C Thomas, ©2013</subfield><subfield code="z">9780398088712</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=545566</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1123391</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10864797</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">545566</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10245788</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | USA gnd |
geographic_facet | USA |
id | ZDB-4-EBA-ocn828793784 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:12Z |
institution | BVB |
isbn | 9780398088729 0398088721 |
language | English |
oclc_num | 828793784 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (227 pages) |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Charles C Thomas, |
record_format | marc |
spelling | Mendell, Ronald L. http://id.loc.gov/authorities/names/n94002556 Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. Springfield : Charles C Thomas, 2013. 1 online resource (227 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Chapter 1 -- IDENTITY THEFT; Chapter 2 -- SOCIAL ENGINEERING; Chapter 3 -- DISINFORMATION; Chapter 4 -- DIGITAL EVIDENCE ANDDIGITAL REPOSITORIES; Chapter 5 -- THE THEFT OF PERSONALINFORMATION REPOSITORIES; Chapter 6 -- MISUSE OF ONLINE INFORMATION; Chapter 7 -- MISUSE OF ELECTRONIC SURVEILLANCE; Chapter 8 -- THEFT OF PHYSICAL INFORMATION ASSETS; Chapter 9 -- PSYCHOLOGICAL DIMENSIONS; Chapter 10 -- THE FUTURE OFINFORMATION-BASED CRIMES; Appendix A; Appendix B; Appendix C; GLOSSARY; BIBLIOGRAPHY. This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging "shadow" financial domain. This includes the new world of "smartphones," prepaid. Print version record. Includes bibliographical references (pages 199-205) and index. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Confidential communications. http://id.loc.gov/authorities/subjects/sh85030929 Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Criminalité informatique Enquêtes. Protection de l'information (Informatique) Secret professionnel. Enquêtes criminelles. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Computer crimes Investigation fast Confidential communications fast Criminal investigation fast Data protection fast Strafverfolgung gnd Computerkriminalität gnd Identität gnd http://d-nb.info/gnd/4026482-8 Datenmissbrauch gnd Persönlichkeitsrecht gnd http://d-nb.info/gnd/4045245-1 Datenschutz gnd USA gnd has work: Investigating Information-Based Crimes (Text) https://id.oclc.org/worldcat/entity/E39PCH7mh3XpvW6Gyfdq4r8xQq https://id.oclc.org/worldcat/ontology/hasWork Print version: Mendell, Ronald L. Investigating Information-Based Crimes : A Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. Springfield : Charles C Thomas, ©2013 9780398088712 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=545566 Volltext |
spellingShingle | Mendell, Ronald L. Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. Chapter 1 -- IDENTITY THEFT; Chapter 2 -- SOCIAL ENGINEERING; Chapter 3 -- DISINFORMATION; Chapter 4 -- DIGITAL EVIDENCE ANDDIGITAL REPOSITORIES; Chapter 5 -- THE THEFT OF PERSONALINFORMATION REPOSITORIES; Chapter 6 -- MISUSE OF ONLINE INFORMATION; Chapter 7 -- MISUSE OF ELECTRONIC SURVEILLANCE; Chapter 8 -- THEFT OF PHYSICAL INFORMATION ASSETS; Chapter 9 -- PSYCHOLOGICAL DIMENSIONS; Chapter 10 -- THE FUTURE OFINFORMATION-BASED CRIMES; Appendix A; Appendix B; Appendix C; GLOSSARY; BIBLIOGRAPHY. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Confidential communications. http://id.loc.gov/authorities/subjects/sh85030929 Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Criminalité informatique Enquêtes. Protection de l'information (Informatique) Secret professionnel. Enquêtes criminelles. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Computer crimes Investigation fast Confidential communications fast Criminal investigation fast Data protection fast Strafverfolgung gnd Computerkriminalität gnd Identität gnd http://d-nb.info/gnd/4026482-8 Datenmissbrauch gnd Persönlichkeitsrecht gnd http://d-nb.info/gnd/4045245-1 Datenschutz gnd |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029493 http://id.loc.gov/authorities/subjects/sh85035859 http://id.loc.gov/authorities/subjects/sh85030929 http://id.loc.gov/authorities/subjects/sh85034045 http://d-nb.info/gnd/4026482-8 http://d-nb.info/gnd/4045245-1 |
title | Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |
title_auth | Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |
title_exact_search | Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |
title_full | Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |
title_fullStr | Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |
title_full_unstemmed | Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |
title_short | Investigating Information-Based Crimes : |
title_sort | investigating information based crimes a guide for investigators on crimes against person related to the theft or manipulation of information assets |
title_sub | a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets. |
topic | Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Confidential communications. http://id.loc.gov/authorities/subjects/sh85030929 Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Criminalité informatique Enquêtes. Protection de l'information (Informatique) Secret professionnel. Enquêtes criminelles. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Computer crimes Investigation fast Confidential communications fast Criminal investigation fast Data protection fast Strafverfolgung gnd Computerkriminalität gnd Identität gnd http://d-nb.info/gnd/4026482-8 Datenmissbrauch gnd Persönlichkeitsrecht gnd http://d-nb.info/gnd/4045245-1 Datenschutz gnd |
topic_facet | Computer crimes Investigation. Data protection. Confidential communications. Criminal investigation. Criminalité informatique Enquêtes. Protection de l'information (Informatique) Secret professionnel. Enquêtes criminelles. BUSINESS & ECONOMICS Infrastructure. SOCIAL SCIENCE General. Computer crimes Investigation Confidential communications Criminal investigation Data protection Strafverfolgung Computerkriminalität Identität Datenmissbrauch Persönlichkeitsrecht Datenschutz USA |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=545566 |
work_keys_str_mv | AT mendellronaldl investigatinginformationbasedcrimesaguideforinvestigatorsoncrimesagainstpersonrelatedtothetheftormanipulationofinformationassets |