The deviant security practices of cyber crime

In this book academic and police officer Erik van de Sandt researches the security practices of cyber criminals. While their protective practices are not necessarily deemed criminal by law, the countermeasures of cyber criminals frequently deviate from prescribed bona fide cyber security standards....

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Sandt, Erik H. A. van de (VerfasserIn)
Medienart: Druck Buch
Sprache:Englisch
Veröffentlicht: Leiden Boston Brill Nijhoff [2021]
In:Jahr: 2021
Online-Zugang: Inhaltsverzeichnis
Klappentext
Bestand in Tübingen:In Tübingen vorhanden.
UB: KB 21 A 2049
Verfügbarkeit prüfen: HBZ Gateway
Subito Bestelldienst: Jetzt bestellen.
Schlagwörter:

MARC

LEADER 00000cam a2200000 c 4500
001 1752663225
003 DE-627
005 20241106231702.0
007 tu
008 210329s2021 ne ||||| 00| ||eng c
020 |a 9789004463172  |c Festeinband  |9 978-90-04-46317-2 
020 |a 9004463178  |9 90-04-46317-8 
024 3 |a 9789004463172 
035 |a (DE-627)1752663225 
035 |a (DE-599)KXP1752663225 
035 |a (OCoLC)1313609483 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
044 |c XA-NL  |c XD-US 
050 0 |a K5011-5316 
072 7 |a LNQ  |2 bicssc 
082 0 |a 345 
084 |a 2,1  |2 ssgn 
084 |a 86.55  |2 bkl 
100 1 |a Sandt, Erik H. A. van de  |e VerfasserIn  |0 (DE-588)1250928044  |0 (DE-627)1788433963  |4 aut 
109 |a Sandt, Erik H. A. van de  |a Van de Sandt, Erik H. A 
245 1 4 |a The deviant security practices of cyber crime  |c Erik H. A. van de Sandt 
264 1 |a Leiden  |a Boston  |b Brill Nijhoff  |c [2021] 
264 4 |c © 2021 
300 |a XV, 336 Seiten  |b Illustrationen 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Bibliographie: Seite [279]-331 
520 |a In this book academic and police officer Erik van de Sandt researches the security practices of cyber criminals. While their protective practices are not necessarily deemed criminal by law, the countermeasures of cyber criminals frequently deviate from prescribed bona fide cyber security standards. This book is the first to present a full picture on these deviant security practices, based on unique access to confidential police sources related to some of the world's most serious and organized cyber criminals. The findings of this socio-technical-legal research prove that deviant security is an academic field of study on its own, and will help a non-technical audience to understand cyber security and the challenges of investigating cyber crime 
583 1 |a Archivierung/Langzeitarchivierung gewährleistet  |f FID  |x XA-DE-BW  |2 pdager  |5 DE-21 
689 0 0 |d s  |0 (DE-588)4010452-7  |0 (DE-627)106357816  |0 (DE-576)208888128  |a Computerkriminalität  |2 gnd 
689 0 1 |d s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 0 |5 (DE-627) 
776 1 |z 9789004463189  |c (ebook) 
856 4 2 |u https://swbplus.bsz-bw.de/bsz1752663225inh.htm  |m V:DE-576  |m B:DE-Frei85  |q application/pdf  |v 20211209184153  |3 Inhaltsverzeichnis 
856 4 2 |u https://swbplus.bsz-bw.de/bsz1752663225kla.htm  |m V:DE-576  |m B:DE-21  |v 20220625193119  |3 Klappentext 
935 |a mkri 
936 b k |a 86.55  |j Datenschutzrecht  |q SEPA  |0 (DE-627)106422472 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4128561436 
LOK |0 003 DE-627 
LOK |0 004 1752663225 
LOK |0 005 20220609150146 
LOK |0 008 220503||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 852   |a DE-21 
LOK |0 852 1  |c KB 21 A 2049  |9 00 
LOK |0 935   |a krim 
LOK |0 938   |a 2206  |f 34 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3983247954 
LOK |0 003 DE-627 
LOK |0 004 1752663225 
LOK |0 005 20211208135641 
LOK |0 008 211004||||||||||||||||ger||||||| 
LOK |0 040   |a DE-Frei85  |c DE-627  |d DE-Frei85 
LOK |0 852   |a DE-Frei85 
LOK |0 852 1  |m p  |9 00 
LOK |0 938   |k p 
ORI |a SA-MARC-krimdoka001.raw 
SIG |a UB: KB 21 A 2049