|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1251741396 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
210506s2021 ne ab ob 001 0 eng |
010 |
|
|
|a 2021021509
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d OCLCO
|d OCLCF
|d EBLCP
|d YDX
|d N$T
|d OCLCO
|d COO
|d OCLCA
|d YWS
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9004463186
|q electronic book
|
020 |
|
|
|a 9789004463189
|q (electronic bk.)
|
020 |
|
|
|z 9789004463172
|q hardcover
|q acid- free paper
|
029 |
1 |
|
|a AU@
|b 000069264303
|
035 |
|
|
|a (OCoLC)1251741396
|
042 |
|
|
|a pcc
|
050 |
0 |
4 |
|a HV6773
|b .V35 2021
|
082 |
0 |
0 |
|a 364.16/8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Van de Sandt, Erik H. A.,
|e author.
|
245 |
1 |
4 |
|a The deviant security practices of cyber crime /
|c by Erik H.A. van de Sandt.
|
264 |
|
1 |
|a Leiden ;
|a Boston :
|b Brill Nijhoff,
|c [2021]
|
300 |
|
|
|a 1 online resource :
|b illustrations (some color), color maps
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Based on author's thesis (doctoral - University of Bristol, 2019) issued under title: Deviant security : the technical computer security practices of cyber criminals.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction -- 'Good guy' perspectives on security -- Touching upon security controls of cyber Criminals -- A multidisciplinary approach for deviant security -- What? -- Basic qualities of deviant security -- Who? -- Interactive qualities of deviant security -- When & where? -- Temporal-spatial qualities of deviant security -- Investigative responses against deviant security -- The outlook of deviant security.
|
520 |
|
|
|a "In this book academic and police officer Erik van de Sandt researches the security practices of cyber criminals. While their protective practices are not necessarily deemed criminal by law, the countermeasures of cyber criminals frequently deviate from prescribed bona fide cyber security standards. This book is the first to present a full picture on these deviant security practices, based on unique access to confidential police sources related to some of the world's most serious and organized cyber criminals. The findings of this socio-technical-legal research prove that deviant security is an academic field of study on its own, and will help a non-technical audience to understand cyber security and the challenges of investigating cyber crime"--
|c Provided by publisher.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on September 23, 2021).
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Criminology.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Criminologie.
|
650 |
|
7 |
|a criminology.
|2 aat
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Criminology
|2 fast
|
758 |
|
|
|i has work:
|a The deviant security practices of cyber crime (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGbQpPDFxPvBJvwdDXrRmm
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Van de Sandt, Erik H. A.
|t Deviant security practices of cyber crime
|d Leiden ; Boston : Brill Nijoff, 2021
|z 9789004463172
|w (DLC) 2021021508
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6697091
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17272273
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6697091
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2996278
|
994 |
|
|
|a 92
|b IZTAP
|