Computer Forensics and Cyber Crime : Am Introduction (Record no. 36122)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01765nam a22001937a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131764015 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 BRI-C |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Britz, Marjie T |
245 ## - TITLE STATEMENT | |
Title | Computer Forensics and Cyber Crime : Am Introduction |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Delhi |
Name of publisher, distributor, etc | Pearson |
Date of publication, distribution, etc | 2012 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 380p. |
500 ## - GENERAL NOTE | |
General note | Introduction<br/>Computer Terminology & History<br/>Traditional Computer Crime: Hackers and Theft of Components<br/>Contemporary Computer Crime<br/>Identity Theft & Identity Fraud<br/>Organized Crime & Terrorism<br/>Avenues for Prosecution and Government Efforts<br/>Applying the First Amendment to Computer Related Crime<br/>The Fourth Amendment & Other Legal Issues<br/>Forensic Terminology & Developing Forensic Capabilities<br/>Searching and Seizing Computer Related Evidence<br/>Processing Evidence and Report Preparation<br/>Conclusions & Future Issues<br/>Salient Features<br/>A comprehensive examination of forensic computer science. Gives students a text that is an excellent first step in learning about the investigation of computer crime.<br/>Comprehensive background coverage provides a history of computer crime. Introduces students to the subject by providing an excellent historical framework for computer crime and cyberspace.<br/>Discussion of current legal issues as well as future trends. Helps students understand how free-speech and privacy rights relate to computer crimes and their investigation.<br/> |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer programming, programs & data |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://books.google.co.in/books?id=stkL4CQ2W20C&printsec=frontcover&dq=Computer+Forensics+and+Cyber+Crime+by+britz&hl=en&sa=X&ved=0ahUKEwje0_Gpv6PnAhUDyzgGHZC2D2UQ6AEIKDAA#v=onepage&q=Computer%20Forensics%20and%20Cyber%20Crime%20by%20britz&f=false">https://books.google.co.in/books?id=stkL4CQ2W20C&printsec=frontcover&dq=Computer+Forensics+and+Cyber+Crime+by+britz&hl=en&sa=X&ved=0ahUKEwje0_Gpv6PnAhUDyzgGHZC2D2UQ6AEIKDAA#v=onepage&q=Computer%20Forensics%20and%20Cyber%20Crime%20by%20britz&f=false</a> |
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN) | |
Acc. No. | 24724 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Date last borrowed |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Not For Loan | Reference | Amity Central Library | Amity Central Library | Forensic Science | 25/09/2016 | SBA | 699.00 | SBA / 11562 3/9/2016 | 005.8 BRI-C | 24724 | 25/09/2016 | 25/09/2016 | Books | |||||
Dewey Decimal Classification | Amity Central Library | Amity Central Library | Forensic Science | 25/09/2016 | SBA | 699.00 | SBA / 11562 3/9/2016 | 6 | 005.8 BRI-C | 24725 | 16/08/2023 | 25/09/2016 | Books | 16/08/2023 |