<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Scene of the cybercrime</title>
    <subTitle>computer forensics handbook</subTitle>
  </titleInfo>
  <titleInfo type="alternative">
    <title>Scene of the cyber crime computer forensics handbook</title>
  </titleInfo>
  <titleInfo type="alternative">
    <title>Safari books online</title>
  </titleInfo>
  <name type="personal">
    <namePart>Shinder, Debra Littlejohn</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
    <role>
      <roleTerm type="text"/>
    </role>
  </name>
  <name type="personal">
    <namePart>Tittel, Ed</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="">Electronic books</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">mau</placeTerm>
    </place>
    <place>
      <placeTerm type="text">Rockland, MA</placeTerm>
    </place>
    <publisher>Syngress Pub.</publisher>
    <dateIssued>c2002</dateIssued>
    <dateIssued encoding="marc">2002</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">electronic</form>
    <form authority="gmd"/>
    <extent>xxxi, 718 p. : ill</extent>
  </physicalDescription>
  <abstract>Computer and network related crime is a problem that spans  the globe, and unites those in two disparate fields: law  enforcement and information technology. This book helps  both IT pros and law </abstract>
  <tableOfContents>CONTENTS: Forward -- Facing the cybercrime problem head   on -- Reviewing the history of cybercrime --   Understanding the people on the scene -- Understanding   computer basics -- Understanding networking basics --   Understanding network intrusions and attacks --   Understanding cybercrime prevention -- Implementing   system security -- Implementing cybercrime detection   techniques -- Collecting and preserving digital evidence   -- Building the cybercrime case -- Afterword -- Appendix  -- Index.   </tableOfContents>
  <note type="statement of responsibility">Debra Littlejohn Shinder ; Ed Tittel, editor</note>
  <note>Includes index</note>
  <subject authority="lcsh">
    <topic>Computer crimes</topic>
    <topic>Investigation</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer networks</topic>
    <topic>Security measures</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Forensic sciences</topic>
  </subject>
  <relatedItem type="host">
    <titleInfo>
      <title>Safari books online</title>
    </titleInfo>
  </relatedItem>
  <identifier type="isbn">0080480780</identifier>
  <identifier type="isbn">9780080480787</identifier>
  <identifier type="isbn" invalid="yes"/>
  <recordInfo>
    <recordCreationDate encoding="marc">130214</recordCreationDate>
    <recordChangeDate encoding="iso8601">20181127182855.0</recordChangeDate>
    <recordIdentifier>7087</recordIdentifier>
  </recordInfo>
</mods>
