It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.12.20150123.full.mrc:155362516:1687
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.12.20150123.full.mrc:155362516:1687?format=raw

LEADER: 01687cam a2200337 a 4500
001 012135382-6
005 20100503094135.0
008 091119s2010 cau b 001 0 eng
010 $a 2009048693
015 $aGBB011625$2bnb
016 7 $a015478584$2Uk
020 $a9780313365461 (hard copy : alk. paper)
020 $a0313365466 (hard copy : alk. paper)
020 $a9780313365478 (ebook)
020 $a0313365474 (ebook)
035 0 $aocn464583250
040 $aDLC$cDLC$dYDX$dBTCTA$dUKM$dYDXCP$dCDX$dMH-L
050 00 $aHV6773$b.B75 2010
082 00 $a364.16/8$222
100 1 $aBrenner, Susan W.,$d1947-
245 10 $aCybercrime :$bcriminal threats from cyberspace /$cSusan W. Brenner.
260 $aSanta Barbara, Calif. :$bPraeger,$cc2010.
300 $aix, 281 p. ;$c25 cm.
490 0 $aCrime, media, and popular culture
504 $aIncludes bibliographical references and index.
505 0 $aTwenty-first century twilight zone : stalking a town -- From mainframes to metaverse : the origins and evolution of cybercrime -- Three categories of cybercrime -- Target cybercrimes : hacking, malware, and distributed denial of service -- Tool cybercrimes : fraud, harassment-- murder? -- Cyber-CSI : computer crime scene -- Beyond war games : who are the cybercriminals? -- Cyber-law and order : investigating and prosecuting cybercrime -- U.S. law enforcement : agencies and challenges -- Global law enforcement : few agencies, even more challenges -- Privacy versus security : which trumps? -- New ways to fight cybercrime.
650 0 $aComputer crimes.
650 0 $aComputer networks$xLaw and legislation.
988 $a20091203
049 $aHLSS
906 $0DLC