Cyber crime and cyber terrorism investigator's handbook:
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concern...
Gespeichert in:
Weitere beteiligte Personen: | , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, Massachusetts
Elsevier
2014
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9780128007433 http://www.sciencedirect.com/science/book/9780128007433 |
Zusammenfassung: | Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 online resource (307 pages) |
ISBN: | 9780128008119 0128008113 0128007435 9780128007433 1306977339 9781306977333 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126618 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2014 xx o|||| 00||| eng d | ||
020 | |a 9780128008119 |9 978-0-12-800811-9 | ||
020 | |a 0128008113 |9 0-12-800811-3 | ||
020 | |a 0128007435 |9 0-12-800743-5 | ||
020 | |a 9780128007433 |9 978-0-12-800743-3 | ||
020 | |a 1306977339 |9 1-306-97733-9 | ||
020 | |a 9781306977333 |9 978-1-306-97733-3 | ||
035 | |a (ZDB-33-ESD)ocn889268705 | ||
035 | |a (OCoLC)889268705 | ||
035 | |a (DE-599)BVBBV046126618 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 363.25/968 |2 23 | |
245 | 1 | 0 | |a Cyber crime and cyber terrorism investigator's handbook |c edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
264 | 1 | |a Waltham, Massachusetts |b Elsevier |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (307 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o | ||
650 | 7 | |a BUSINESS & ECONOMICS / Infrastructure |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE / General |2 bisacsh | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 4 | |a Crime | |
650 | 4 | |a Internet | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Cyberterrorism |x Investigation | |
650 | 4 | |a Computer crimes |x Investigation |v Case studies | |
650 | 4 | |a Cyberterrorism |x Investigation |v Case studies | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 2 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Akhgar, Babak |4 edt | |
700 | 1 | |a Staniforth, Andrew |4 edt | |
700 | 1 | |a Bosco, Francesca M. |4 edt | |
700 | 1 | |a Elliot, Steve |4 edt | |
700 | 1 | |a Rearick, Benjamin |4 project director | |
700 | 1 | |a Kumaraguruparan, Priya |4 project director | |
700 | 1 | |a Rogers, Mark |4 dsr | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128007433 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128007433 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031507072 | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128007433 |l DE-860 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818985995606949888 |
---|---|
any_adam_object | |
author2 | Akhgar, Babak Staniforth, Andrew Bosco, Francesca M. Elliot, Steve Rearick, Benjamin Kumaraguruparan, Priya Rogers, Mark |
author2_role | edt edt edt edt pdr pdr dsr |
author2_variant | b a ba a s as f m b fm fmb s e se b r br p k pk m r mr |
author_facet | Akhgar, Babak Staniforth, Andrew Bosco, Francesca M. Elliot, Steve Rearick, Benjamin Kumaraguruparan, Priya Rogers, Mark |
building | Verbundindex |
bvnumber | BV046126618 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn889268705 (OCoLC)889268705 (DE-599)BVBBV046126618 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03489nam a2200697zc 4500</leader><controlfield tag="001">BV046126618</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2014 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128008119</subfield><subfield code="9">978-0-12-800811-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128008113</subfield><subfield code="9">0-12-800811-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128007435</subfield><subfield code="9">0-12-800743-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128007433</subfield><subfield code="9">978-0-12-800743-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306977339</subfield><subfield code="9">1-306-97733-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306977333</subfield><subfield code="9">978-1-306-97733-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn889268705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)889268705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126618</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber crime and cyber terrorism investigator's handbook</subfield><subfield code="c">edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (307 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Infrastructure</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Investigation</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Akhgar, Babak</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Staniforth, Andrew</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bosco, Francesca M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Elliot, Steve</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rearick, Benjamin</subfield><subfield code="4">project director</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumaraguruparan, Priya</subfield><subfield code="4">project director</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Mark</subfield><subfield code="4">dsr</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128007433</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128007433</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507072</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128007433</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV046126618 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:43:45Z |
institution | BVB |
isbn | 9780128008119 0128008113 0128007435 9780128007433 1306977339 9781306977333 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507072 |
oclc_num | 889268705 |
open_access_boolean | |
physical | 1 online resource (307 pages) |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier |
record_format | marc |
spelling | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers Waltham, Massachusetts Elsevier 2014 © 2014 1 online resource (307 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many o BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation fast Crime Internet Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf (DE-588)4522595-3 Fallstudiensammlung gnd-content Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s Computerforensik (DE-588)4774034-6 s 1\p DE-604 Akhgar, Babak edt Staniforth, Andrew edt Bosco, Francesca M. edt Elliot, Steve edt Rearick, Benjamin project director Kumaraguruparan, Priya project director Rogers, Mark dsr Erscheint auch als Druck-Ausgabe 9780128007433 http://www.sciencedirect.com/science/book/9780128007433 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cyber crime and cyber terrorism investigator's handbook BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation fast Crime Internet Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4774034-6 (DE-588)7864395-8 (DE-588)4522595-3 |
title | Cyber crime and cyber terrorism investigator's handbook |
title_auth | Cyber crime and cyber terrorism investigator's handbook |
title_exact_search | Cyber crime and cyber terrorism investigator's handbook |
title_full | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
title_fullStr | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
title_full_unstemmed | Cyber crime and cyber terrorism investigator's handbook edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
title_short | Cyber crime and cyber terrorism investigator's handbook |
title_sort | cyber crime and cyber terrorism investigator s handbook |
topic | BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation fast Crime Internet Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | BUSINESS & ECONOMICS / Infrastructure SOCIAL SCIENCE / General Computer crimes / Investigation Crime Internet Computer crimes Investigation Cyberterrorism Investigation Computer crimes Investigation Case studies Cyberterrorism Investigation Case studies Computersicherheit Computerforensik Internetkriminalität Fallstudiensammlung |
url | http://www.sciencedirect.com/science/book/9780128007433 |
work_keys_str_mv | AT akhgarbabak cybercrimeandcyberterrorisminvestigatorshandbook AT staniforthandrew cybercrimeandcyberterrorisminvestigatorshandbook AT boscofrancescam cybercrimeandcyberterrorisminvestigatorshandbook AT elliotsteve cybercrimeandcyberterrorisminvestigatorshandbook AT rearickbenjamin cybercrimeandcyberterrorisminvestigatorshandbook AT kumaraguruparanpriya cybercrimeandcyberterrorisminvestigatorshandbook AT rogersmark cybercrimeandcyberterrorisminvestigatorshandbook |