Matches in Harvard for { <http://id.lib.harvard.edu/aleph/007701083/catalog> ?p ?o. }
Showing items 1 to 29 of
29
with 100 items per page.
- catalog abstract ""Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet ... Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods." "This book is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators. Also included is the text of U.S. federal, state, and international computer crime laws."--Jacket.".
- catalog contributor b10646889.
- catalog contributor b10646890.
- catalog contributor b10646891.
- catalog created "1995.".
- catalog date "1995".
- catalog date "1995.".
- catalog dateCopyrighted "1995.".
- catalog description ""Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet ... Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods." "This book is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators. Also included is the text of U.S. federal, state, and international computer crime laws."--Jacket.".
- catalog description "Includes bibliographical references (p. 353-357) and index.".
- catalog description "Preface -- Part I: Overview -- Introduction to computer crime -- What are the crimes? -- Who commits computer crimes? -- What are the laws? -- Part II: Preventing computer crime -- What is at risk? -- Physical security -- Personnel security -- Communications security -- Operations security -- Part III: Handling computer crime -- Planning how to handle a computer crime -- Investigating a computer crime -- Prosecuting a computer crime -- Part IV: Computer crime laws -- Part V: Appendices -- Resource summary -- Raiding the computer room -- The microcomputer as evidence -- A sample search warrant.".
- catalog extent "xxi, 437 p. :".
- catalog hasFormat "Computer crime.".
- catalog identifier "1565920864".
- catalog isFormatOf "Computer crime.".
- catalog issued "1995".
- catalog issued "1995.".
- catalog language "eng".
- catalog publisher "Sebastopol, CA : O'Reilly & Associates,".
- catalog relation "Computer crime.".
- catalog spatial "United States.".
- catalog subject "Computer crimes.".
- catalog subject "Computer security.".
- catalog subject "Computers Law and legislation United States.".
- catalog subject "Electronic data processing departments Security measures.".
- catalog subject "HV6773 .I36 1995".
- catalog tableOfContents "Preface -- Part I: Overview -- Introduction to computer crime -- What are the crimes? -- Who commits computer crimes? -- What are the laws? -- Part II: Preventing computer crime -- What is at risk? -- Physical security -- Personnel security -- Communications security -- Operations security -- Part III: Handling computer crime -- Planning how to handle a computer crime -- Investigating a computer crime -- Prosecuting a computer crime -- Part IV: Computer crime laws -- Part V: Appendices -- Resource summary -- Raiding the computer room -- The microcomputer as evidence -- A sample search warrant.".
- catalog title "Computer crime : a crimefighter's handbook / David Icove, Karl Seger, and William VonStorch.".
- catalog type "text".