<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01679nam a2200313   4500</leader>
  <controlfield tag="001">7087</controlfield>
  <controlfield tag="005">20181127182855.0</controlfield>
  <controlfield tag="008">130214s2002    maua    s     001 0 eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0080480780</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780080480787</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="z">9781931836654</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Shinder, Debra Littlejohn</subfield>
    <subfield code="e"></subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Scene of the cybercrime :</subfield>
    <subfield code="h"></subfield>
    <subfield code="b">computer forensics handbook /</subfield>
    <subfield code="c">Debra Littlejohn Shinder ; Ed Tittel, editor</subfield>
  </datafield>
  <datafield tag="246" ind1="3" ind2=" ">
    <subfield code="a">Scene of the cyber crime computer forensics handbook</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Rockland, MA :</subfield>
    <subfield code="b">Syngress Pub.,</subfield>
    <subfield code="c">c2002</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xxxi, 718 p. :</subfield>
    <subfield code="b">ill</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">Includes index</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">CONTENTS: Forward -- Facing the cybercrime problem head   on -- Reviewing the history of cybercrime --   Understanding the people on the scene -- Understanding   computer basics -- Understanding networking basics --   Understanding network intrusions and attacks --   Understanding cybercrime prevention -- Implementing   system security -- Implementing cybercrime detection   techniques -- Collecting and preserving digital evidence   -- Building the cybercrime case -- Afterword -- Appendix  -- Index.</subfield>
    <subfield code="g"></subfield>
    <subfield code="r"></subfield>
    <subfield code="t"></subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">Computer and network related crime is a problem that spans  the globe, and unites those in two disparate fields: law  enforcement and information technology. This book helps  both IT pros and law </subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes</subfield>
    <subfield code="x">Investigation</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Forensic sciences</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="0">
    <subfield code="a">Electronic books</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Tittel, Ed</subfield>
  </datafield>
  <datafield tag="740" ind1="0" ind2=" ">
    <subfield code="a">Safari books online</subfield>
  </datafield>
  <datafield tag="773" ind1="0" ind2=" ">
    <subfield code="t">Safari books online</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">6014</subfield>
    <subfield code="d">6014</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">MAIN</subfield>
    <subfield code="a">RTCLIB</subfield>
    <subfield code="b">RTCLIB</subfield>
    <subfield code="c">MAIN</subfield>
    <subfield code="h"> </subfield>
    <subfield code="i">10914</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">364.16 SHI</subfield>
    <subfield code="p">30010241</subfield>
    <subfield code="r">2018-11-27 00:00:00</subfield>
    <subfield code="w">2018-11-27</subfield>
    <subfield code="y">MAIN</subfield>
  </datafield>
</record>
