|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-15150-2 |
003 |
DE-He213 |
005 |
20220127122524.0 |
007 |
cr nn 008mamaa |
008 |
150226s2015 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319151502
|9 978-3-319-15150-2
|
024 |
7 |
|
|a 10.1007/978-3-319-15150-2
|2 doi
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a TEC009000
|2 bisacsh
|
072 |
|
7 |
|a UYQ
|2 thema
|
082 |
0 |
4 |
|a 006.3
|2 23
|
100 |
1 |
|
|a Chawki, Mohamed.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Cybercrime, Digital Forensics and Jurisdiction
|h [electronic resource] /
|c by Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XVIII, 145 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Computational Intelligence,
|x 1860-9503 ;
|v 593
|
505 |
0 |
|
|a Part I Fundamentals of Cybercrime -- Part II Computer System as Target -- Part III Computer System as Tool -- Part IV Content - Related Offenses -- Part V Privacy, Security and Crime Control.
|
520 |
|
|
|a The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Information technology-Law and legislation.
|
650 |
|
0 |
|a Mass media-Law and legislation.
|
650 |
|
0 |
|a Security systems.
|
650 |
1 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a IT Law, Media Law, Intellectual Property.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
700 |
1 |
|
|a Darwish, Ashraf.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Khan, Mohammad Ayoub.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Tyagi, Sapna.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319151519
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319151496
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319377261
|
830 |
|
0 |
|a Studies in Computational Intelligence,
|x 1860-9503 ;
|v 593
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-15150-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|