MARC details
000 -LEADER |
fixed length control field |
03646cam a22004098i 4500 |
001 - CONTROL NUMBER |
control field |
21936031 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
PACUniversity |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240307153506.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210311s2022 flu b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2021007948 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367251574 |
Qualifying information |
(hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781032053851 |
Qualifying information |
(paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9780429318726 |
Qualifying information |
(ebook) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773 |
Item number |
.A425 2022 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
364.16/8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Alexandrou, Alex |
Titles and words associated with a name |
(Professor of information technology security), |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cybercrime and Internet technology : |
Remainder of title |
theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices / |
Statement of responsibility, etc. |
Alex Alexandrou. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
2108 |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Boca Raton, FL : |
Name of producer, publisher, distributor, manufacturer |
CRC Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
434 pgs 25cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Cybercrime and Internet Technology: Theory and Practice - The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text, outlining the fundamentals of computing devices and network functions, core security concepts, and how devices can be used to both perpetrate and facilitate crimes. Digital evidence recovery and forensic investigation are addressed in the context of legal statutes and implications insofar as the perpetration of crimes and digital crimes in particular. Many books on the market cover investigations, or forensic recovery and presentation of evidence. Others seek to explain computer and network security. This book takes the whole of the problem after focusing on the core, essential principles governing computers, wireless devices, network and cloud systems, then understanding their vulnerabilities. Only in this way can the security challenges, and opportunity for crime, be understood to be properly uncovered, investigated, and adjudicated. The legal portion of the book examines currently legislation, statues, and both domestic and international law. This includes various cases that are currently in-process that are shaping legal precedent going forward. Case law and standards are addressed relative to the present status as well as where they are headed. Ss is often the case, new technologies require new statues and regulations-something the laws are often slow to move on given the current speed in which technology advances. Cybercrime and Internet Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach at technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
General subdivision |
Law and legislation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Online version: |
Main entry heading |
Alexandrou, Alex (Professor of information technology security). |
Title |
Cybercrime and Internet technology |
Edition |
First edition. |
Place, publisher, and date of publication |
Boca Raton : CRC Press, 2022. |
International Standard Book Number |
9780429318726 |
Record control number |
(DLC) 2021007949 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
General books |
Classification part |
HV 6773 |
Item part |
.A425 |
Call number prefix |
2022 |