|
|
|
|
LEADER |
03026nam a22005415i 4500 |
001 |
978-3-319-15150-2 |
003 |
DE-He213 |
005 |
20151103123512.0 |
007 |
cr nn 008mamaa |
008 |
150226s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319151502
|9 978-3-319-15150-2
|
024 |
7 |
|
|a 10.1007/978-3-319-15150-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.3
|2 23
|
100 |
1 |
|
|a Chawki, Mohamed.
|e author.
|
245 |
1 |
0 |
|a Cybercrime, Digital Forensics and Jurisdiction
|h [electronic resource] /
|c by Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XVIII, 145 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 593
|
505 |
0 |
|
|a Part I Fundamentals of Cybercrime -- Part II Computer System as Target -- Part III Computer System as Tool -- Part IV Content – Related Offenses -- Part V Privacy, Security and Crime Control.
|
520 |
|
|
|a The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a System safety.
|
650 |
|
0 |
|a International law.
|
650 |
|
0 |
|a Intellectual property
|x Law and legislation.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a International IT and Media Law, Intellectual Property Law.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
700 |
1 |
|
|a Darwish, Ashraf.
|e author.
|
700 |
1 |
|
|a Khan, Mohammad Ayoub.
|e author.
|
700 |
1 |
|
|a Tyagi, Sapna.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319151496
|
830 |
|
0 |
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 593
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-15150-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|