Transformational dimensions of cyber crime

"Cybercrimes committed against persons include various crimes like transmission of child-pornography harassment of any one with the use of a computer such as email. The trafficking, distribution, posting and dissemination of obscene material including pornography and indecent exposure, constitu...

Full description

Saved in:  
Bibliographic Details
Main Author: Sirohi, M. N. (Author)
Format: Print Book
Language:English
Published: New Delhi (India) Alpha Editions 2015
In:Year: 2015
Online Access: Inhaltsverzeichnis (Verlag)
Klappentext (Verlag)
Availability in Tübingen:Present in Tübingen.
UB: KB 20 A 9739
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:

MARC

LEADER 00000cam a2200000 4500
001 1618603787
003 DE-627
005 20230610174623.0
007 tu
008 160217s2015 ii ||||| 00| ||eng c
020 |a 9788193142233  |9 978-81-931422-3-3 
020 |a 8193142233  |9 81-931422-3-3 
035 |a (DE-627)1618603787 
035 |a (DE-576)455575347 
035 |a (DE-599)BSZ455575347 
035 |a (OCoLC)930147736 
035 |a (OCoLC)1060650589 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
044 |c XB-IN 
084 |a 2,1  |2 ssgn 
100 1 |a Sirohi, M. N.  |e VerfasserIn  |0 (DE-588)1107794935  |0 (DE-627)863622585  |0 (DE-576)455575274  |4 aut 
109 |a Sirohi, M. N. 
245 1 0 |a Transformational dimensions of cyber crime  |c by Dr. M. N. Sirohi 
264 1 |a New Delhi (India)  |b Alpha Editions  |c 2015 
264 4 |c ©2015 
300 |a vii, 280 Seiten  |c 23 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Includes bibliographical references (pages 277-278) and index 
520 |a "Cybercrimes committed against persons include various crimes like transmission of child-pornography harassment of any one with the use of a computer such as email. The trafficking, distribution, posting and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important cybercrimes known today. The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists -- and the number, cost, and sophistication of the attacks are increasing at alarming rates. The challenge of controlling transnational cyber crime requires a full range of responses, including both voluntary and legally mandated cooperation This book makes an serious attempt to understand the Cyber Crime which involves activities like Credit Card Frauds, unauthorized excess to other's computer system, Pornography, Software piracy and Cyber stalking etc."--Back cover 
583 1 |a Archivierung/Langzeitarchivierung gewährleistet  |f SSG  |2 pdager  |5 DE-21 
650 0 |a Computer crimes 
650 0 |a Computer security 
650 0 |a Cyberterrorism 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer crimes 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
650 0 |a Cyberterrorism 
689 0 0 |d s  |0 (DE-588)7864395-8  |0 (DE-627)700634487  |0 (DE-576)363213635  |a Internetkriminalität  |2 gnd 
689 0 |5 (DE-627) 
856 4 2 |u https://swbplus.bsz-bw.de/bsz455575347inh.htm  |m B:DE-576;DE-21  |q application/pdf  |v 20160816120846  |x Verlag  |3 Inhaltsverzeichnis 
856 4 2 |u https://swbplus.bsz-bw.de/bsz455575347kla.htm  |m B:DE-576;DE-21  |q application/pdf  |v 20160816120846  |x Verlag  |3 Klappentext 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3217795768 
LOK |0 003 DE-627 
LOK |0 004 1618603787 
LOK |0 005 20181009094139 
LOK |0 008 181009||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 852   |a DE-21 
LOK |0 852 1  |c KB 20 A 9739  |9 00 
LOK |0 935   |a krim 
LOK |0 938   |a 1810  |f 34 
ORI |a SA-MARC-krimdoka001.raw 
SIG |a UB: KB 20 A 9739