MARC details
000 -LEADER |
fixed length control field |
02094cam a22003494a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20180801110359.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
021210s2004 nyua be 001 0ceng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9788130915159 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0816049785 (HC : acidfree paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0816049793 (PB : acidfree paper) |
041 ## - LANGUAGE CODE |
Language |
English |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
364.168 |
Edition number |
21 |
Item number |
NEW |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Newton, Michael, |
245 14 - TITLE STATEMENT |
Title |
The encyclopedia of high-tech crime and crime-fighting / |
Statement of responsibility, etc |
Michael Newton. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York,NY : |
Name of publisher, distributor, etc |
Checkmark Books, |
Date of publication, distribution, etc |
c2004. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 377 p. : |
Other physical details |
ill. ; |
Dimensions |
29 cm. |
500 ## - GENERAL NOTE |
General note |
The history of crime in America has proven that criminals are often the first to seize upon opportunities presented by new technologies and use them for nefarious purposes. It has also shown that law enforcement groups are quick to respond and use high-tech tools to defend the public safety. This work is a comprehensive survey of how the underworld takes advantage of new tools and techniques and how authorities can fight back, prevent crime, and capture criminals. In more than 420 entries, it covers DNA and medical evidence to computer virus attacks, from blood spatter analysis to explosive detection devices. |
505 ## - FORMATTED CONTENTS NOTE |
Contents |
Airport security; chemical and biological weapons; computer fraud and sabotage/hacking; computer viruses; cryptology; DNA and other medical evidence; identity theft; luminal testing; non-lethal weapons; nuclear emergency search team; phone cloning and fraud; psychological profiling; satellite surveillance; school security; software, video, and satellite piracy; telephone fraud; toxicology. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer viruses |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Hackers |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
100 1# - MAIN ENTRY--PERSONAL NAME |
Dates associated with a name |
1951- |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (p. 363-366) and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Form subdivision |
Encyclopedias. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Form subdivision |
Encyclopedias. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Form subdivision |
Biography. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ocip |
f |
20 |
g |
y-gencatlg |