000 -LEADER |
fixed length control field |
02697cam a2200361 i 4500 |
001 - CONTROL NUMBER |
control field |
18613760 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250513120811.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150512s2015 enk b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2015018983 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781107034570 (hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781107698161 (paperback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
K5215 |
Item number |
.C58 2015 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
345/.0268 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Clough, Jonathan, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Principles of cybercrime / |
Statement of responsibility, etc. |
Jonathan Clough. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cambridge, United Kingdom : |
Name of producer, publisher, distributor, manufacturer |
Cambridge University Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
lvi, 524 pages ; |
Dimensions |
23 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (pages 489-512) and index. |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Machine generated contents note: Part I. Introduction: 1. Cybercrime; Part II. Computer as Target: 2. Computer as target; 3. Access offences; 4. Modification or impairment of data; 5. Misuse of devices; 6. Interception of data; Part III. Fraud and Related Offences: 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; Part IV. Content-Related Offences; 10. Child pornography; Part V. Offences against the Person: 11. 'Grooming'; 12. Harassment; 13. Voyeurism; Part VI. Jurisdiction: 14. Jurisdiction. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Law and legislation. |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Cover image |
Uniform Resource Identifier |
http://assets.cambridge.org/97811070/34570/cover/9781107034570.jpg |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Books |