MARC details
000 -LEADER |
fixed length control field |
04533cam a2200373 i 4500 |
001 - CONTROL NUMBER |
control field |
18244701 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
JGU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241113020005.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
Paper bound |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140728s2015 enk b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2014028368 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781138021303 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773 |
Item number |
.H648 2015 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.25968 |
Edition number |
23 |
Item number |
HO-C |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
SOC004000 |
Source of number |
bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Holt, Thomas J |
9 (RLIN) |
43230 |
245 10 - TITLE STATEMENT |
Title |
Cybercrime and digital forensics |
Remainder of title |
an introduction |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
London |
Name of publisher, distributor, etc |
Routledge |
Date of publication, distribution, etc |
2015 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiii, 486 p. |
Dimensions |
24 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology.This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:key theoretical and methodological perspectives,computer hacking and digital piracy,economic crime and online fraud,pornography and online sex crime,cyber-bulling and cyber-stalking,cyber-terrorism and extremism,digital forensic investigation and its legal context,cybercrime policy.This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology"-- |
520 ## - SUMMARY, ETC. |
Summary, etc |
"The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology. This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: key theoretical and methodological perspectives, computer hacking and digital piracy, economic crime and online fraud, pornography and online sex crime, cyber-bulling and cyber-stalking, cyber-terrorism and extremism, digital forensic investigation and its legal context, cybercrime policy. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes. |
9 (RLIN) |
43231 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Forensic sciences. |
9 (RLIN) |
43135 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
SOCIAL SCIENCE / Criminology. |
Source of heading or term |
bisacsh |
9 (RLIN) |
34686 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Bossler, Adam M |
9 (RLIN) |
43232 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Seigfried-Spellar, Kathryn C |
9 (RLIN) |
43233 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Print |
Koha issues (borrowed), all copies |
4 |