Hylla
Författare/Namn
Titel Computer crime , investigation, and the law
Förlag, etc. Cengage Learning, Boston, MA : 2011
Utgivningsår
Upplaga
Antal sidor etc.
Anmärkning: Innehåll Computer Crime Introduction to Computer Crime A History of Computer Crime in America United States Computer Laws Part I United States Computer Laws Part II Techniques and Resources for Computer Crime Organized Crime and Cyber Terrorism Computer Forensics Observing, Collecting, Documenting, and Storing Electronic Evidence Collecting Evidence from Hardware Collecting Evidence from the Operating System Collecting Evidence from Other Sources Litigation Experts and Expert Reports Depositions and Trials Civil Matters Relating to Computer Crime Computer Crime and Individuals Protecting Children on the Internet How to Protect Your Identity on the Internet Harassment and Stalking Via the Computer Techniques Hacker Techniques How Cyber Criminals Communicate
Ämnesord
Medarbetare
ISBN 1--43545532-0 (softcover : alk. paper) 978-1--43545532-0
Antal i kö:
*00002424cam a22004217a 4500
*00120005
*00520121126125656.0
*008091130s2011 mau 000 0 eng c
*020 $a1--43545532-0 (softcover : alk. paper)$x1--43545532-0
*020 $a978-1--43545532-0$x978-1--43545532-0
*035 $a(SE-LIBR)13602612$x13602612
*035 $a16001294
*040 $aDLC$cDLC$dPhs
*08204$a363.2$222 (machine generated)
*0830 $a005.8$222 (machine generated)
*084 $aOepb$2kssb/8
*084 $aPubds$2kssb/8
*1001 $aEasttom, Chuck.
*24510$aComputer crime , investigation, and the law /$cChuck Easttom and Det. Jeff Taylor
*250 $a1st Ed.
*260 $aBoston, MA :$bCengage Learning,$c2011$y2011
*300 $a499 p :$bill ;$c23 cm.
*5050 $aComputer Crime Introduction to Computer Crime A History of Computer Crime in America United States Computer Laws Part I United States Computer Laws Part II Techniques and Resources for Computer Crime Organized Crime and Cyber Terrorism Computer Forensics Observing, Collecting, Documenting, and Storing Electronic Evidence Collecting Evidence from Hardware Collecting Evidence from the Operating System Collecting Evidence from Other Sources Litigation Experts and Expert Reports Depositions and Trials Civil Matters Relating to Computer Crime Computer Crime and Individuals Protecting Children on the Internet How to Protect Your Identity on the Internet Harassment and Stalking Via the Computer Techniques Hacker Techniques How Cyber Criminals Communicate
*650 7$aDatabrott$xjuridik och lagstiftning$2sao
*650 7$aIT-forensisk verksamhet$2sao$0https://id.kb.se/term/sao/IT-forensisk%20verksamhet
*650 7$aComputer related crime $2ncjt
*650 7$aComputer -related crime legislation$zUnited States of America$2ncjt
*650 7$aForensic sciences$2ncjt
*650 7$aCriminal investigation$2ncjt
*7001 $aTaylor, Jeff,$cDet.
*841 $ax a$b1211264u 8 1001uu 0901128$e4$5Phs
*8528 $bPhs$hPubds$5Phs
*950 s$aDatorteknisk rättsanalys$uIT-forensisk verksamhet
*950 s$aDigitala bevis$uIT-forensisk verksamhet
*950 s$aElektroniskt bevismaterial$uIT-forensisk verksamhet
*950 k$aBrottsutredning$uIT-forensisk verksamhet$wg
*950 k$aKriminalteknik$uIT-forensisk verksamhet$wg
^
Det finns inga omdömen till denna titeln.
Klicka här
för att vara den första som skriver ett omdöme.