Cybercrime and Internet technology : (Record no. 657325)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02684cam a22002178i 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780367251574 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781032053851 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 364.168 |
Edition number | 23 |
Item number | ALE.C |
100 1# - MAIN ENTRY--AUTHOR NAME | |
Personal name | Alexandrou, Alex |
245 10 - TITLE STATEMENT | |
Title | Cybercrime and Internet technology : |
Sub Title | theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices / |
Statement of responsibility, etc | Alex Alexandrou. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | UK, |
Name of publisher | CRC Press, |
Year of publication | 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 434Pages |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Cybercrime and Internet Technology: Theory and Practice - The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text, outlining the fundamentals of computing devices and network functions, core security concepts, and how devices can be used to both perpetrate and facilitate crimes. Digital evidence recovery and forensic investigation are addressed in the context of legal statutes and implications insofar as the perpetration of crimes and digital crimes in particular. Many books on the market cover investigations, or forensic recovery and presentation of evidence. Others seek to explain computer and network security. This book takes the whole of the problem after focusing on the core, essential principles governing computers, wireless devices, network and cloud systems, then understanding their vulnerabilities. Only in this way can the security challenges, and opportunity for crime, be understood to be properly uncovered, investigated, and adjudicated. The legal portion of the book examines currently legislation, statues, and both domestic and international law. This includes various cases that are currently in-process that are shaping legal precedent going forward. Case law and standards are addressed relative to the present status as well as where they are headed. Ss is often the case, new technologies require new statues and regulations-something the laws are often slow to move on given the current speed in which technology advances. Cybercrime and Internet Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach at technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer networks |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Reference |
Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Home Library | Current Location | Shelving location | Date acquired | Full call number | Accession Number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Not For Loan | Reference | Dept. of Law | Dept. of Law | Reference | 14/09/2022 | 364.168 ALE.C | LAW5843 | 14/09/2022 | Reference |