It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_updates/v37.i51.records.utf8:4495077:1526
Source Library of Congress
Download Link /show-records/marc_loc_updates/v37.i51.records.utf8:4495077:1526?format=raw

LEADER: 01526cam a2200325 a 4500
001 2008047888
003 DLC
005 20091215104024.0
008 081120s2009 nyu b 001 0 eng
010 $a 2008047888
015 $aGBA989656$2bnb
016 7 $a015367239$2Uk
020 $a9781606922545 (softcover)
020 $a1606922548 (softcover)
035 $a(OCoLC)ocn261174844
040 $aDLC$cDLC$dYDX$dBTCTA$dYDXCP$dCDX$dUKM$dDLC
043 $an-us---
050 00 $aKF9350$b.D695 2009
082 00 $a345.73/0268$222
245 00 $aCybercrime and its implications /$cCharles Doyle, editor.
246 3 $aCyber crime and its implications
260 $aNew York :$bNova Science Publishers,$cc2009.
300 $axii, 155 p. ;$c23 cm.
504 $aIncludes bibliographical references (p. [63]-82) and index.
505 0 $aTrespassing in government cyberspace (18 U.S.C. 1030(a)(3)) -- Obtaining information by unauthorized computer access (18 U.S.C. 1030(a)(2)) -- Causing computer damage (18 U.S.C. 1030(a)(5)) -- Computer fraud (18 U.S.C. 1030(a)(4)) -- Extortionate threats (18 U.S.C. 1030(a)(7)) -- Trafficking in computer access (18 U.S.C. 1030(a)(6)) -- Computer espionage (18 U.S.C. 1030(a)(1)).
650 0 $aComputer crimes$zUnited States.
650 0 $aComputer networks$xLaw and legislation$zUnited States$xCriminal provisions.
650 0 $aInternet$xLaw and legislation$zUnited States$xCriminal provisions.
650 0 $aData protection$xLaw and legislation$zUnited States.
700 1 $aDoyle, Charles.