Cybercrime and digital forensics: an introduction
"The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one ano...
Main Author: | |
---|---|
Contributors: | ; |
Format: | Print Book |
Language: | English |
Published: |
London [u.a.]
Routledge
2015
|
In: | Year: 2015 |
Online Access: |
Inhaltsverzeichnis (Verlag) Klappentext (Verlag) |
Availability in Tübingen: | Present in Tübingen. UB: KB 20 A 7319 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: |
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | 79195207X | ||
003 | DE-627 | ||
005 | 20250219125042.0 | ||
007 | tu | ||
008 | 140806s2015 xxk||||| 00| ||eng c | ||
010 | |a 2014028368 | ||
016 | 7 | |a GBB501051 |2 UK | |
020 | |a 9781138021297 |c hbk. : £100.00 |9 978-1-138-02129-7 | ||
020 | |a 9781138021303 |c pbk. : £34.99 |9 978-1-138-02130-3 | ||
024 | 3 | |a 9781138021303 | |
035 | |a (DE-627)79195207X | ||
035 | |a (DE-576)426278631 | ||
035 | |a (DE-599)GBV79195207X | ||
035 | |a (OCoLC)915580825 | ||
035 | |a (OCoLC)904458293 | ||
035 | |a (BL)017001079 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XA-GB |c XD-US | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 363.25/968 |q LOC |2 23 | |
082 | 0 | |a 363.25968 | |
082 | 0 | 4 | |a SOC004000 |q bisacsh |
084 | |a 2,1 |2 ssgn | ||
084 | |a 86.41 |2 bkl | ||
084 | |a 05.38 |2 bkl | ||
084 | |a 71.65 |2 bkl | ||
100 | 1 | |a Holt, Thomas J. |d 1978- |0 (DE-588)14391930X |0 (DE-627)704643197 |0 (DE-576)167596403 |4 aut | |
109 | |a Holt, Thomas J. 1978- |a Holt, Thomas Jeffrey 1978- | ||
245 | 1 | 0 | |a Cybercrime and digital forensics |b an introduction |c Thomas J Holt; Adam M Bossler; and Kathryn C. Seigfried-Spellar |
264 | 1 | |a London [u.a.] |b Routledge |c 2015 | |
300 | |a XIII, 486 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
520 | |a "The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology.This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:key theoretical and methodological perspectives,computer hacking and digital piracy,economic crime and online fraud,pornography and online sex crime,cyber-bulling and cyber-stalking,cyber-terrorism and extremism,digital forensic investigation and its legal context,cybercrime policy.This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology"-- | ||
520 | |a "The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology. This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: key theoretical and methodological perspectives, computer hacking and digital piracy, economic crime and online fraud, pornography and online sex crime, cyber-bulling and cyber-stalking, cyber-terrorism and extremism, digital forensic investigation and its legal context, cybercrime policy. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology"-- | ||
520 | |a "The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology.This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:key theoretical and methodological perspectives,computer hacking and digital piracy,economic crime and online fraud,pornography and online sex crime,cyber-bulling and cyber-stalking,cyber-terrorism and extremism,digital forensic investigation and its legal context,cybercrime policy.This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology"-- | ||
520 | |a "The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology. This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: key theoretical and methodological perspectives, computer hacking and digital piracy, economic crime and online fraud, pornography and online sex crime, cyber-bulling and cyber-stalking, cyber-terrorism and extremism, digital forensic investigation and its legal context, cybercrime policy. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology"-- | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SSG |x XA-DE-BW |2 pdager |5 DE-21 | |
650 | 0 | |a Digital forensic science | |
650 | 0 | |a Computer crimes | |
650 | 0 | |a Forensic sciences | |
689 | 0 | 0 | |d s |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4774034-6 |0 (DE-627)384639607 |0 (DE-576)216262739 |a Computerforensik |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Bossler, Adam M. |0 (DE-588)1068897945 |0 (DE-627)82099846X |0 (DE-576)283974648 |4 aut | |
700 | 1 | |a Seigfried-Spellar, Kathryn C. |0 (DE-588)1068898070 |0 (DE-627)820998737 |0 (DE-576)395837774 |4 aut | |
776 | 1 | |z 9781315777870 |c ebook | |
776 | 1 | |z 9781315777870 | |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz426278631inh.htm |m B:DE-576;DE-21 |q application/pdf |v 20150415141043 |x Verlag |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz426278631kla.htm |m B:DE-576;DE-21 |q application/pdf |v 20150415141044 |x Verlag |3 Klappentext |
935 | |i Blocktest | ||
936 | b | k | |a 86.41 |j Kriminologie |0 (DE-627)181572001 |
936 | b | k | |a 05.38 |j Neue elektronische Medien |x Kommunikationswissenschaft |0 (DE-627)106419579 |
936 | b | k | |a 71.65 |j Kriminalität als soziales Problem |0 (DE-627)106412248 |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3175560903 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 79195207X | ||
LOK | |0 005 20150325155713 | ||
LOK | |0 008 150212||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 20 A 7319 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 1503 |f 34 | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 20 A 7319 |