Cybercrime and digital forensics : (Record no. 2532)

MARC details
000 -LEADER
fixed length control field 04809cam a2200409Ma 4500
001 - CONTROL NUMBER
control field on1158831795
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240618083642.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140728s2015 enk e b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138021303
Qualifying information Paperback
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1158831795
040 ## - CATALOGING SOURCE
Original cataloging agency AEADA
Language of cataloging ara
Description conventions rda
Transcribing agency AEADA
Modifying agency OCLCF
-- OCLCO
-- OCLCL
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773
Item number .H648 2015
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.2596 HOL
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Holt, Thomas J.,
Dates associated with a name 1978-
245 10 - TITLE STATEMENT
Title Cybercrime and digital forensics :
Remainder of title an introduction /
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Abingdon, Oxon :
Name of producer, publisher, distributor, manufacturer Routledge,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xiii, 486 pages ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Include bibliography referencing
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology.This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:key theoretical and methodological perspectives,computer hacking and digital piracy,economic crime and online fraud,pornography and online sex crime,cyber-bulling and cyber-stalking,cyber-terrorism and extremism,digital forensic investigation and its legal context,cybercrime policy.This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology"--
Assigning source Provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc. "The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology. This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: key theoretical and methodological perspectives, computer hacking and digital piracy, economic crime and online fraud, pornography and online sex crime, cyber-bulling and cyber-stalking, cyber-terrorism and extremism, digital forensic investigation and its legal context, cybercrime policy. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology"--
Assigning source Provided by publisher.
546 ## - LANGUAGE NOTE
Language note English
600 ## - SUBJECT ADDED ENTRY--PERSONAL NAME
Source of heading or term Thomas J Holt
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Forensic sciences.
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Forensic Sciences
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element forensic science.
Source of heading or term aat
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872063
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Forensic sciences
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00932011
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Computer crimes. - forensic science.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bossler, Adam M.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Seigfried-Spellar, Kathryn C.
758 ## - RESOURCE IDENTIFIER
Label Cybercrime and Digital Forensics (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCFQDkTcpxh7mbVgWkrtmHP
Relationship https://id.oclc.org/worldcat/ontology/hasWork
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Suppress in OPAC No
Classification part 363.2596 HOL
948 ## - LOCAL PROCESSING INFORMATION (OCLC); SERIES PART DESIGNATOR (RLIN)
h (OCLC) NO HOLDINGS IN GHUCC - 1 OTHER HOLDINGS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Copy number
    Dewey Decimal Classification     Information Technology Botho University Botswana Botho University Botswana Open Shelves 06/06/2024 BooksBotswana 606.11   363.25 HOL BU-LIB24243 06/06/2024 757.64 06/06/2024 Books  
    Dewey Decimal Classification     Information Technology Botho University Botswana Botho University Botswana Open Shelves 06/06/2024 BooksBotswana 606.11   363.25 HOL BU-LIB24245 06/14/2024 757.64 06/06/2024 Books  
    Dewey Decimal Classification     Information Technology Botho University Lesotho Botho University Lesotho Open Shelves 06/18/2024       363.2596 HOL BK003282 06/18/2024   06/18/2024 Books 1

Powered by Koha