MARC details
000 -LEADER |
fixed length control field |
02466nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520100613.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781437755824 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV 8079.C65 .M66 2011 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Moore, Robert |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Cybercrime : |
Remainder of title |
investigating high-technology computer crime / |
Statement of responsibility, etc. |
Robert Moore |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
London, United Kingdom : |
Name of publisher, distributor, etc. |
Routledge Taylor & Francis Group, |
Date of publication, distribution, etc. |
c2011 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
x, 318 pages : |
Other physical details |
illustrations ; |
Dimensions |
26 cm. |
365 ## - TRADE PRICE |
Price amount |
PHP3599 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
An introduction to high-technology crime -- Hackers, crackers, and phone phreaks -- Identity theft : tools and techniques of 21st-century bandits -- Digital child pornography and the abuse of children in cyberspace -- Financial fraud and con artistry on the Internet -- Online harassment and cyberstalking -- Intellectual property theft and digital file sharing -- Investigating on the web : examining online investigations and sting operations -- Seizure of digital evidence -- Executing a search warrant for digital evidence -- An introduction to computer forensics -- The future of high-technology crime -- An introduction to cybercriminology : what is cybercriminology. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Cybercrime: Investigating High-Technology Computer Crime, Second Edition, provides an introduction to a rapidly changing field of the criminal justice system. It discusses various aspects of high-technology crime, or cybercrime, for individuals with limited or no knowledge of computers and/or computer networking. The book is organized into three sections. The first section provides an introduction to cybercrime. The second section addresses issues associated with the investigation and prosecution of these crimes. The final section offers insights into the future of studies of high-technology crime, including the emerging field of cybercriminology. Each chapter ends with a series of review questions that highlight the important terminology and concepts discussed. Each chapter also contains reference to related books, articles, or court cases; a list of relevant websites that readers may visit; and a brief spotlight on a news story that addresses how the materials discussed in the chapter are used or encountered in practice. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER CRIMES -- INVESTIGATION -- UNITED STATES |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |