Computer Crime A Crimefighter's Handbook
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and...
Saved in:
Main Authors: | , , |
---|---|
Format: | Book |
Language: | English |
Published: |
Sebastopol, CA
O'Reilly & Associates
1995
|
Series: | Computer security
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-146887 | ||
005 | 20231029154135 | ||
008 | 231129t19951995XXU ag# ##001 ##eng#D | ||
020 | # | # | |a 1565920864 |q paperback |
020 | # | # | |a 9781565920866 |q paperback |
040 | # | # | |a DLC |b eng |d UiTM |e rda |
090 | 0 | 0 | |a HV6773 |b .I26 1995 |
100 | 1 | # | |a Icove, David J. |c 1949- |e author |
245 | 1 | 0 | |a Computer Crime |b A Crimefighter's Handbook |c David Icove, Karl Seger, and William VonStorch |
264 | # | 1 | |a Sebastopol, CA |b O'Reilly & Associates |c 1995 |
300 | # | # | |a xxi, 437 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarier |
490 | 1 | # | |a Computer security |
500 | # | # | |a "Computer security"--Cover |
504 | # | # | |a Includes bibliographical references (p. 353-357) and index |
520 | # | # | |a Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods.Computer Crime: A Crimefighter's Handbook is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators. |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Computer crimes |
700 | 1 | # | |a Seger, Karl |e author |
700 | 1 | # | |a VonStorch, William |e author |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=146887 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2|| |