Profiling hackers: the science of criminal profiling as applied to the world of hacking
Introduction to criminal profiling -- Introducing "cybercrime" -- To be, think and live as a hacker -- The HPP project -- Who are hackers? Part 1 -- Who are hackers? Part 2
Autor principal: | |
---|---|
Otros Autores: | ; |
Tipo de documento: | Print Libro |
Lenguaje: | Inglés |
Publicado: |
Boca Raton, Fla. [u.a.]
CRC Press /Taylor & Francis [u.a.]
2009
|
En: | Año: 2009 |
Acceso en línea: |
Inhaltsverzeichnis (Verlag) |
Disponibilidad en Tübingen: | Disponible en Tübingen. UB: KB 20 A 3611 |
Verificar disponibilidad: | HBZ Gateway |
Servicio de pedido Subito: | Pedir ahora. |
Palabras clave: |
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | 1617331104 | ||
003 | DE-627 | ||
005 | 20250504182306.0 | ||
007 | tu | ||
008 | 090120s2009 xxu||||| 00| ||eng c | ||
016 | 7 | |a b8A3462 |2 UK | |
020 | |a 9781420086935 |9 978-1-4200-8693-5 | ||
020 | |a 1420086936 |c pbk. (alk. paper) : £31,99 |9 1-4200-8693-6 | ||
035 | |a (DE-627)1617331104 | ||
035 | |a (DE-576)301746664 | ||
035 | |a (DE-599)BSZ301746664 | ||
035 | |a (OCoLC)634778786 | ||
035 | |a (OCoLC)316285614 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng |h ita | ||
044 | |c XD-US |c XA-GB | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 363.25968 | |
082 | 0 | |a 363.25/968 |q LOC |2 22 | |
084 | |a ST 277 |2 rvk |0 (DE-625)rvk/143643: | ||
084 | |a PZ 3700 |2 rvk |0 (DE-625)rvk/141172: | ||
084 | |a 54.38 |2 bkl | ||
100 | 1 | |a Chiesa, Raoul |d 1973- |0 (DE-588)1146936125 |0 (DE-627)1008349313 |0 (DE-576)26320524X |4 aut | |
109 | |a Chiesa, Raoul 1973- | ||
240 | 1 | 0 | |a Profilo hacker <engl.> |
245 | 1 | 0 | |a Profiling hackers |b the science of criminal profiling as applied to the world of hacking |c Raoul Chiesa; Stefania Ducci; Silvio Ciappi |
264 | 1 | |a Boca Raton, Fla. [u.a.] |b CRC Press /Taylor & Francis [u.a.] |c 2009 | |
300 | |a XXIII, 262 S. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
490 | 0 | |a An Auerbach book | |
500 | |a Translated from the Italian. - Includes bibliographical references and index | ||
505 | 8 | |a Introduction to criminal profiling -- Introducing "cybercrime" -- To be, think and live as a hacker -- The HPP project -- Who are hackers? Part 1 -- Who are hackers? Part 2. | |
520 | |a Introduction to criminal profiling -- Introducing "cybercrime" -- To be, think and live as a hacker -- The HPP project -- Who are hackers? Part 1 -- Who are hackers? Part 2 | ||
583 | 1 | |a Archivierung prüfen |c 20200919 |f DE-640 |z 3 |2 pdager | |
583 | 1 | |a Archivierung prüfen |c 20240324 |f DE-4165 |z 1 |2 pdager | |
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |c 20240722 |f NI-LastCopies |x XA-DE-NI |z Potenzieller Alleinbesitz Niedersachsen |2 pdager |5 DE-89 | |
650 | 0 | |a Computer crimes | |
650 | 0 | |a Computer security | |
650 | 0 | |a Hackers | |
650 | 0 | |a Criminal behavior, Prediction of | |
650 | 4 | |a Computer hackers | |
689 | 0 | 0 | |d s |0 (DE-588)4113821-1 |0 (DE-627)105826642 |0 (DE-576)209479604 |a Hacker |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)7548425-0 |0 (DE-627)520312457 |0 (DE-576)257768599 |a Täterprofil |2 gnd |
689 | 0 | |5 (DE-627) | |
689 | 1 | 0 | |d s |0 (DE-588)4113821-1 |0 (DE-627)105826642 |0 (DE-576)209479604 |a Hacker |2 gnd |
689 | 1 | 1 | |d s |0 (DE-588)7548425-0 |0 (DE-627)520312457 |0 (DE-576)257768599 |a Täterprofil |2 gnd |
689 | 1 | |5 (DE-627) | |
700 | 1 | |a Ducci, Stefania |4 aut | |
700 | 1 | |a Ciappi, Silvio |4 aut | |
856 | 4 | 2 | |u http://www.loc.gov/catdir/toc/ecip0820/2008024603.html |x Verlag |3 Inhaltsverzeichnis |
889 | |w (DE-627)569481236 | ||
935 | |i mdedup | ||
936 | r | v | |a ST 277 |b Sonstiges zur Sicherheit in der Datenverarbeitung |k Informatik |k Monografien |k Software und -entwicklung |k Sonstiges zur Sicherheit in der Datenverarbeitung |0 (DE-627)1271118971 |0 (DE-625)rvk/143643: |0 (DE-576)201118971 |
936 | r | v | |a PZ 3700 |b Datenschutz / Strafrecht, Computerkriminalität (BF Datenverarbeitung / Kriminalität) |k Rechtswissenschaft |k Datenverarbeitung und Recht |k Computerrecht, EDV-Recht, Recht des Internet |k Datenschutz / Strafrecht, Computerkriminalität (BF Datenverarbeitung / Kriminalität) |0 (DE-627)1271478900 |0 (DE-625)rvk/141172: |0 (DE-576)201478900 |
936 | b | k | |a 54.38 |j Computersicherheit |0 (DE-627)106418866 |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3207233597 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1617331104 | ||
LOK | |0 005 20090219122920 | ||
LOK | |0 008 090120||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 20 A 3611 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 936ln |a k4.5.1.2.3 | ||
LOK | |0 938 |a 0902 |f 34 | ||
ORI | |a WA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 20 A 3611 |