Cybercrime investigators handbook / (Record no. 63904)

MARC details
000 -LEADER
fixed length control field 02520dam a2200289 i 4500
001 - CONTROL NUMBER
control field 0000370518
003 - CONTROL NUMBER IDENTIFIER
control field 0001
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221118s2020 nju o 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019023232
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Qualifying information (epub)
Qualifying information (adobe pdf)
Canceled/invalid ISBN 9781119596288
Qualifying information (cloth)
International Standard Book Number 9781119596288 (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25 968
Edition number 23
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 363.25 968
Number source 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Edwards, Graeme
Titles and words associated with a name (Financial and cybercrime investigator),
Relator term author.
245 10 - TITLE STATEMENT
Title Cybercrime investigators handbook /
Medium Book /
Statement of responsibility, etc. Graeme Edwards, PhD.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 296 pages :
Dimensions 23 cm.
365 ## - TRADE PRICE
Price type code 01
Price amount 12,612.00
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc. "This book provides the reader with the knowledge and investigative methodology on how to investigate cybercrime from a field practitioner's perspective. Cybercrime is aggressively targeting governments, businesses and individuals of all levels in increasing numbers, law enforcement can provide only limited support and civilian investigators have to take responsibility for investigating their own crimes. While there are very high-quality manuals for conducting digital examinations on a device or network that has been hacked, there is no known guide for those who want to use this information to commence an investigation from the location the offence occurred with the intention of location and prosecuting the attacker. That is, from the cybercrime scene. This book provides a valuable contribution to the actual practical ground level investigation including evidence location, lawful seizure, preservation, examination, interpretation and management. These are core duties which if not completed correctly, leads to poor quality and incomplete investigations. It is believed this handbook will sit alongside the other texts stated and fill the gap in the marketplace where the front-line investigator has limited guidance on how to react at the cybercrime scene whilst the offence is occurring. In addition, this book will also help those companies that are GDPR (General Data Protection Regulation, a European Union regulation that instituted new new rules governing the use and manipulation of personal data) follow a plan if their data is compromised"--
Assigning source Provided by publisher.
521 ## - TARGET AUDIENCE NOTE
Target audience note All.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
852 ## - LOCATION
Accession No. 10001000062427
-- 12612.00
-- World Book Co.
Former shelving location Reference
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Total checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Junaid Zaidi Library, COMSATS University Islamabad Junaid Zaidi Library, COMSATS University Islamabad 09/09/2023   REF 363.25968 EDW-C 10001000062427 09/09/2023 09/09/2023 Books