MARC details
000 -LEADER |
fixed length control field |
01887cam a22003374a 4500 |
001 - CONTROL NUMBER |
control field |
14163957 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20131008125532.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
Hard bound |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
051102s2006 njua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2005031926 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780471757245 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocm62281947 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
BAKER |
-- |
C#P |
-- |
IXA |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
043 ## - GEOGRAPHIC AREA CODE |
Geographic area code |
n-us--- |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.25963222 |
Edition number |
22 |
Item number |
CO-I |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Collins, Judith M |
245 10 - TITLE STATEMENT |
Title |
Investigating identity theft |
Remainder of title |
a guide for businesses, law enforcement, and victims |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New Jersey |
Name of publisher, distributor, etc |
John Wiley & Sons |
Date of publication, distribution, etc |
2006 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv,252p. |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (p. 249-250) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
"Real world" cases: solved and unsolved -- Know the crime and understand the criminal -- Computer security for identity fraud investigations -- Configuring the computer and introduction to cyber-searching -- Understand the victim: then prepare for the investigation -- Authenticate, then investigate -- Identity fraud investigation: a case example -- A walk through the World Wide Web -- Tracing IP addresses and URLs across the WWW -- Tracing e-mail addresses -- Searching and seizing: the investigator's role. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Identity theft |
Geographic subdivision |
United States. |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents only |
Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/toc/ecip063/2005031926.html">http://www.loc.gov/catdir/toc/ecip063/2005031926.html</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Publisher description |
Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0662/2005031926-d.html">http://www.loc.gov/catdir/enhancements/fy0662/2005031926-d.html</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Contributor biographical information |
Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0740/2005031926-b.html">http://www.loc.gov/catdir/enhancements/fy0740/2005031926-b.html</a> |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Print |