Cybercrime, Digital Forensics and Jurisdiction (Record no. 58742)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03025nam a22005535i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-15150-2 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421112549.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 150226s2015 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319151502 |
-- | 978-3-319-15150-2 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 006.3 |
100 1# - AUTHOR NAME | |
Author | Chawki, Mohamed. |
245 10 - TITLE STATEMENT | |
Title | Cybercrime, Digital Forensics and Jurisdiction |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVIII, 145 p. |
490 1# - SERIES STATEMENT | |
Series statement | Studies in Computational Intelligence, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Part I Fundamentals of Cybercrime -- Part II Computer System as Target -- Part III Computer System as Tool -- Part IV Content - Related Offenses -- Part V Privacy, Security and Crime Control. |
520 ## - SUMMARY, ETC. | |
Summary, etc | The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Law and legislation. |
700 1# - AUTHOR 2 | |
Author 2 | Darwish, Ashraf. |
700 1# - AUTHOR 2 | |
Author 2 | Khan, Mohammad Ayoub. |
700 1# - AUTHOR 2 | |
Author 2 | Tyagi, Sapna. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-15150-2 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2015. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Engineering. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | System safety. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | International law. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Intellectual property |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational intelligence. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Engineering. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational Intelligence. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information Systems Applications (incl. Internet). |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | International IT and Media Law, Intellectual Property Law. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Science and Technology. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1860-949X ; |
912 ## - | |
-- | ZDB-2-ENG |
No items available.