Computer Crime A Crimefighter's Handbook

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and...

Full description

Saved in:
Bibliographic Details
Main Authors: Icove, David J. 1949- (Author), Seger, Karl (Author), VonStorch, William (Author)
Format: Book
Language:English
Published: Sebastopol, CA O'Reilly & Associates 1995
Series:Computer security
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-146887
005 20231029154135
008 231129t19951995XXU ag# ##001 ##eng#D
020 # # |a 1565920864  |q paperback 
020 # # |a 9781565920866  |q paperback 
040 # # |a DLC  |b eng  |d UiTM  |e rda 
090 0 0 |a HV6773  |b .I26 1995 
100 1 # |a Icove, David J.  |c 1949-  |e author 
245 1 0 |a Computer Crime  |b A Crimefighter's Handbook  |c David Icove, Karl Seger, and William VonStorch 
264 # 1 |a Sebastopol, CA  |b O'Reilly & Associates  |c 1995 
300 # # |a xxi, 437 pages  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarier 
490 1 # |a Computer security 
500 # # |a "Computer security"--Cover 
504 # # |a Includes bibliographical references (p. 353-357) and index 
520 # # |a Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods.Computer Crime: A Crimefighter's Handbook is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators. 
650 # 0 |a Computer security 
650 # 0 |a Computer crimes 
700 1 # |a Seger, Karl  |e author 
700 1 # |a VonStorch, William  |e author 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=146887 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2||