Polismyndighetens bibliotek och kunskapstjänst

Computer crime, investigation, and the law
Komihåglistan är tom
Vis
Hylla
  • Pubds
Författare/Namn
Titel
  • Computer crime, investigation, and the law
Förlag, etc.
  • Cengage Learning, Boston, MA : 2011
Utgivningsår
  • 2011
Upplaga
  • 1st Ed.
Antal sidor etc.
  • 499 p : ill ; 23 cm.
Anmärkning: Innehåll
  • Computer Crime
    Introduction to Computer Crime
    A History of Computer Crime in America
    United States Computer Laws Part I
    United States Computer Laws Part II
    Techniques and Resources for Computer Crime
    Organized Crime and Cyber Terrorism
    Computer Forensics
    Observing, Collecting, Documenting, and Storing Electronic Evidence
    Collecting Evidence from Hardware
    Collecting Evidence from the Operating System
    Collecting Evidence from Other Sources
    Litigation
    Experts and Expert Reports
    Depositions and Trials
    Civil Matters Relating to Computer Crime
    Computer Crime and Individuals
    Protecting Children on the Internet
    How to Protect Your Identity on the Internet
    Harassment and Stalking Via the Computer
    Techniques
    Hacker Techniques
    How Cyber Criminals Communicate
Ämnesord
Medarbetare
ISBN
  • 1--43545532-0 (softcover : alk. paper)
  • 978-1--43545532-0
Antal i kö:
  • 0 (0)
*00002424cam a22004217a 4500
*00120005
*00520121126125656.0
*008091130s2011    mau           000 0 eng c
*020  $a1--43545532-0 (softcover : alk. paper)$x1--43545532-0
*020  $a978-1--43545532-0$x978-1--43545532-0
*035  $a(SE-LIBR)13602612$x13602612
*035  $a16001294
*040  $aDLC$cDLC$dPhs
*08204$a363.2$222 (machine generated)
*0830 $a005.8$222 (machine generated)
*084  $aOepb$2kssb/8
*084  $aPubds$2kssb/8
*1001 $aEasttom, Chuck.
*24510$aComputer crime, investigation, and the law /$cChuck Easttom and Det. Jeff Taylor
*250  $a1st Ed.
*260  $aBoston, MA :$bCengage Learning,$c2011$y2011
*300  $a499 p :$bill ;$c23 cm.
*5050 $aComputer Crime 
Introduction to Computer Crime
A History of Computer Crime in America
United States Computer Laws Part I
United States Computer Laws Part II
Techniques and Resources for Computer Crime
Organized Crime and Cyber Terrorism
Computer Forensics
Observing, Collecting, Documenting, and Storing Electronic Evidence
Collecting Evidence from Hardware
Collecting Evidence from the Operating System
Collecting Evidence from Other Sources
Litigation
Experts and Expert Reports
Depositions and Trials
Civil Matters Relating to Computer Crime
Computer Crime and Individuals
Protecting Children on the Internet
How to Protect Your Identity on the Internet
Harassment and Stalking Via the Computer
Techniques
Hacker Techniques
How Cyber Criminals Communicate *650 7$aDatabrott$xjuridik och lagstiftning$2sao *650 7$aIT-forensisk verksamhet$2sao$0https://id.kb.se/term/sao/IT-forensisk%20verksamhet *650 7$aComputer related crime$2ncjt *650 7$aComputer-related crime legislation$zUnited States of America$2ncjt *650 7$aForensic sciences$2ncjt *650 7$aCriminal investigation$2ncjt *7001 $aTaylor, Jeff,$cDet. *841 $ax a$b1211264u 8 1001uu 0901128$e4$5Phs *8528 $bPhs$hPubds$5Phs *950 s$aDatorteknisk rättsanalys$uIT-forensisk verksamhet *950 s$aDigitala bevis$uIT-forensisk verksamhet *950 s$aElektroniskt bevismaterial$uIT-forensisk verksamhet *950 k$aBrottsutredning$uIT-forensisk verksamhet$wg *950 k$aKriminalteknik$uIT-forensisk verksamhet$wg ^
Det finns inga omdömen till denna titeln.
Klicka här för att vara den första som skriver ett omdöme.
Vis
Sänd till
Ex.namnStatusFörfallodagLånevillkorHylla
Ex 1Tillgängligt HemlånPubds