<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>02990cam a22003378i 4500</leader>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">29268</subfield>
    <subfield code="d">29239</subfield>
  </datafield>
  <controlfield tag="001">21382792</controlfield>
  <controlfield tag="003">EG-ScBUE</controlfield>
  <controlfield tag="005">20210729091340.0</controlfield>
  <controlfield tag="008">200110s2020    flu    f b    001 0 eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780367196233</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="a">DLC</subfield>
    <subfield code="b">eng</subfield>
    <subfield code="e">rda</subfield>
    <subfield code="c">DLC</subfield>
    <subfield code="d">EG-ScBUE</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
    <subfield code="a">363.25968</subfield>
    <subfield code="b">BAN</subfield>
    <subfield code="2">22</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Bandler, John,</subfield>
    <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Cybercrime investigations :</subfield>
    <subfield code="b">the comprehensive resource for everyone /</subfield>
    <subfield code="c">by John Bandler and Antonia Merzon.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
    <subfield code="a">First edition.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
    <subfield code="a">Boca Raton, FL :</subfield>
    <subfield code="b">CRC Press/ Taylor &amp; Francis Group,</subfield>
    <subfield code="c">2020.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xix, 335 pages ;</subfield>
    <subfield code="c">24 cm</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
    <subfield code="a">text</subfield>
    <subfield code="b">txt</subfield>
    <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
    <subfield code="a">unmediated</subfield>
    <subfield code="b">n</subfield>
    <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
    <subfield code="a">volume</subfield>
    <subfield code="b">nc</subfield>
    <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
    <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">"Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include : Understanding cybercrime, computers, forensics, and cybersecurity, law for the cybercrime investigator, including cybercrime offenses ; cyber evidence-gathering ; criminal, private and regulatory law, and nation-state implications ; cybercrime investigation from three key perspectives : law enforcement, private sector, and regulatory ; financial investigation ; identification (attribution) of cyber-conduct ; apprehension ; litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts ; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout"--</subfield>
    <subfield code="c">Provided by publisher.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="7">
    <subfield code="a">Computer crimes</subfield>
    <subfield code="x">Investigation.</subfield>
    <subfield code="2">BUEsh</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="b">GGEN</subfield>
    <subfield code="c">July2021</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2=" ">
    <subfield code="v">Reading book</subfield>
    <subfield code="9">34232</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Merzon, Antonia,</subfield>
    <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="906" ind1=" " ind2=" ">
    <subfield code="a">7</subfield>
    <subfield code="b">cbc</subfield>
    <subfield code="c">orignew</subfield>
    <subfield code="d">1</subfield>
    <subfield code="e">ecip</subfield>
    <subfield code="f">20</subfield>
    <subfield code="g">y-gencatlg</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BB</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">Alahram</subfield>
    <subfield code="a">MAIN</subfield>
    <subfield code="b">MAIN</subfield>
    <subfield code="c">1ST</subfield>
    <subfield code="d">2021-07-29</subfield>
    <subfield code="e">Purchase</subfield>
    <subfield code="g">1149.00</subfield>
    <subfield code="l">3</subfield>
    <subfield code="m">2</subfield>
    <subfield code="o">363.25968 BAN</subfield>
    <subfield code="p">000050435</subfield>
    <subfield code="r">2025-07-15 00:00:00</subfield>
    <subfield code="s">2022-10-30</subfield>
    <subfield code="v">1436.25</subfield>
    <subfield code="w">2021-07-29</subfield>
    <subfield code="y">BB</subfield>
  </datafield>
</record>
