MARC details
000 -LEADER |
fixed length control field |
03685cam a22004694i 4500 |
001 - CONTROL NUMBER |
control field |
ocm55682154 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240726100301.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
040615s2004 cau b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2004013960 |
039 02 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
CI ocm55682154 |
039 03 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
CO 122996 |
039 06 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
SW ocm55682154 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
Modifying agency |
YDX |
-- |
IXA |
-- |
BAKER |
-- |
SBI |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
049 02 - LOCAL HOLDINGS (OCLC) |
Holding library |
SBIM |
049 03 - LOCAL HOLDINGS (OCLC) |
Holding library |
SHCM |
049 06 - LOCAL HOLDINGS (OCLC) |
Holding library |
SGE |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773.M379.C934 2004 |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Schell, Bernadette H. |
Fuller form of name |
(Bernadette Hlubik), |
Dates associated with a name |
1952-, |
Relator term |
Author |
245 10 - TITLE STATEMENT |
Title |
Cybercrime : |
Remainder of title |
a reference handbook / |
Statement of responsibility, etc. |
Bernadette H. Schell and Clemens Martin. |
Medium |
[print] |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Santa Barbara, California : |
Name of publisher, distributor, etc. |
ABC-CLIO, |
Date of publication, distribution, etc. |
(c)2004. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 247 pages ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Contemporary world issues |
9 (RLIN) |
35027 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
|
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
A history and categories of cybercrime -- |
Title |
Basic cybercrime terms -- |
-- |
Birth of the White Hats -- |
-- |
The origin of the Black Hat label in the United States and Britain -- |
-- |
Y2K : fears emerge about cyberterrorism -- |
-- |
Post-Y2K incidents exacerbating cyberterrorist fears -- |
-- |
Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- |
-- |
Incidents exacerbating cyberterrorism anxieties -- |
-- |
The importance of social engineering to cybercriminals -- |
-- |
Categories of cybercrime : harm to property and/or to persons -- |
-- |
Criminal liability and the coincidence of four elements -- |
-- |
The increasing complexity of property cybercrime -- |
-- |
Cybercrimes against persons -- |
-- |
The nonoffenses of cybervigilantism and hacktivism -- |
-- |
Issues, controversies, and solutions -- |
-- |
Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- |
-- |
Methods used to commit cybercrime, cases, and countermeasures -- |
-- |
Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- |
-- |
Controversial "non-cases" of cracking -- |
-- |
Overview of system vulnerabilities and related controversies -- |
-- |
How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- |
-- |
A case study : outlining the "real" threat of a possible coordinated terror attack -- |
-- |
Using honeypots to better know "the enemy", and controversies surrounding them -- |
-- |
More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- |
-- |
Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- |
-- |
Chronology -- |
-- |
Biographical sketches -- |
-- |
Cybercrime legal cases -- |
-- |
A summary of recent U.S. anti-terror and anti-cybercrime legislation -- |
-- |
General observations about recent trends in cybercrime -- |
-- |
Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyberterrorism. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Martin, Clemens. |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Publisher description |
Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/description/abc050/2004013960.html">http://www.loc.gov/catdir/description/abc050/2004013960.html</a> |
-- |
Publisher description |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents |
Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/toc/ecip0419/2004013960.html">http://www.loc.gov/catdir/toc/ecip0419/2004013960.html</a> |
-- |
Table of contents |
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) |
a |
.b11077530 |
b |
06-30-14 |
c |
01-22-08 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Circulating Book (checkout times vary with patron status) |
Classification part |
HV |
PUBLICATION YEAR |
2004 |
VENDOR |
|
Delivery Date: ACADEMIC YEAR - ie 2022-2023 |
2018-07-14 |
COST |
0.00 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
-- |
ccst |
-- |
cim |
-- |
swg |
Operator's initials, OID (RLIN) |
05-27-09 |
Cataloger's initials, CIN (RLIN) |
m |
First date, FD (RLIN) |
a |
-- |
- |
-- |
eng |
-- |
cau |
-- |
0 |
994 ## - |
-- |
01 |
-- |
SBI |
945 ## - LOCAL PROCESSING INFORMATION (OCLC) |
g |
1 |
i |
31923001102637 |
j |
2 |
l |
cimc |
n |
"repair" status after fire |
o |
- |
p |
0.00 |
q |
- |
r |
- |
s |
- -- |
t |
61 |
u |
0 |
v |
0 |
w |
0 |
x |
0 |
y |
.i11570404 |
z |
01-22-08 |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
a |
1 |
b |
Cynthia Snell |
c |
1 |
d |
Cynthia Snell |