000 | 03025nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-319-15150-2 | ||
003 | DE-He213 | ||
005 | 20200421112549.0 | ||
007 | cr nn 008mamaa | ||
008 | 150226s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319151502 _9978-3-319-15150-2 |
||
024 | 7 |
_a10.1007/978-3-319-15150-2 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
082 | 0 | 4 |
_a006.3 _223 |
100 | 1 |
_aChawki, Mohamed. _eauthor. |
|
245 | 1 | 0 |
_aCybercrime, Digital Forensics and Jurisdiction _h[electronic resource] / _cby Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXVIII, 145 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Computational Intelligence, _x1860-949X ; _v593 |
|
505 | 0 | _aPart I Fundamentals of Cybercrime -- Part II Computer System as Target -- Part III Computer System as Tool -- Part IV Content - Related Offenses -- Part V Privacy, Security and Crime Control. | |
520 | _aThe purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital ForensicsĀ and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aSystem safety. | |
650 | 0 | _aInternational law. | |
650 | 0 |
_aIntellectual property _xLaw and legislation. |
|
650 | 0 | _aComputational intelligence. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aInternational IT and Media Law, Intellectual Property Law. |
650 | 2 | 4 | _aSecurity Science and Technology. |
700 | 1 |
_aDarwish, Ashraf. _eauthor. |
|
700 | 1 |
_aKhan, Mohammad Ayoub. _eauthor. |
|
700 | 1 |
_aTyagi, Sapna. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319151496 |
830 | 0 |
_aStudies in Computational Intelligence, _x1860-949X ; _v593 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-15150-2 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c58742 _d58742 |