The encyclopedia of high-tech crime and crime-fighting / (Record no. 25494)

MARC details
000 -LEADER
fixed length control field 02094cam a22003494a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180801110359.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 021210s2004 nyua be 001 0ceng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788130915159
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0816049785 (HC : acidfree paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0816049793 (PB : acidfree paper)
041 ## - LANGUAGE CODE
Language English
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Edition number 21
Item number NEW
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Newton, Michael,
245 14 - TITLE STATEMENT
Title The encyclopedia of high-tech crime and crime-fighting /
Statement of responsibility, etc Michael Newton.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York,NY :
Name of publisher, distributor, etc Checkmark Books,
Date of publication, distribution, etc c2004.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 377 p. :
Other physical details ill. ;
Dimensions 29 cm.
500 ## - GENERAL NOTE
General note The history of crime in America has proven that criminals are often the first to seize upon opportunities presented by new technologies and use them for nefarious purposes. It has also shown that law enforcement groups are quick to respond and use high-tech tools to defend the public safety. This work is a comprehensive survey of how the underworld takes advantage of new tools and techniques and how authorities can fight back, prevent crime, and capture criminals. In more than 420 entries, it covers DNA and medical evidence to computer virus attacks, from blood spatter analysis to explosive detection devices.
505 ## - FORMATTED CONTENTS NOTE
Contents Airport security; chemical and biological weapons; computer fraud and sabotage/hacking; computer viruses; cryptology; DNA and other medical evidence; identity theft; luminal testing; non-lethal weapons; nuclear emergency search team; phone cloning and fraud; psychological profiling; satellite surveillance; school security; software, video, and satellite piracy; telephone fraud; toxicology.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer viruses
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hackers
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
100 1# - MAIN ENTRY--PERSONAL NAME
Dates associated with a name 1951-
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 363-366) and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Form subdivision Encyclopedias.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Form subdivision Encyclopedias.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Form subdivision Biography.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ocip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Reference CUTN Central Library CUTN Central Library Social Sciences 01/08/2018   364.168 NEW 32440 01/08/2018 01/08/2018 General Books

Powered by Koha