Principles of Cybercrime / (Record no. 114650)

000 -LEADER
fixed length control field 02260nam a22003738a 4500
001 - CONTROL NUMBER
control field CR9781139540803
003 - CONTROL NUMBER IDENTIFIER
control field UkCbUP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20181127100051.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m|||||o||d||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120625s2015||||enk s ||1 0|eng|d
040 ## - CATALOGING SOURCE
Original cataloging agency UkCbUP
Transcribing agency UkCbUP
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number K5215
Item number .C58 2015
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Clough, Jonathan,
Relator term author.
9 (RLIN) 33880
245 10 - TITLE STATEMENT
Title Principles of Cybercrime /
Statement of responsibility, etc Jonathan Clough.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (579 pages) :
Other physical details digital, PDF file(s).
500 ## - GENERAL NOTE
General note Title from publisher's bibliographic system (viewed on 09 Dec 2015).
520 ## - SUMMARY, ETC.
Summary, etc Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
9 (RLIN) 33881
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
International Standard Book Number 9781107034570.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://ebooks.cambridge.org.i.ezproxy.nypl.org/ebook.jsf?bid=CBO9781139540803
Public note Available from home with a valid library card and onsite at NYPL
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
a CBO_NO_OCLC_RELOAD
n 20160530
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
a CBO_NON-OCLC
n 20151209
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
a SCOPE2015
908 00 - PUT COMMAND PARAMETER (RLIN)
Put command parameter K5215
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type General Circulation Books
Classification part K5215
Item part .C58 2015
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type Public note
          Technical University of Kenya Library Technical University of Kenya Library   2018-11-27 K5215 .C58 2015 118B00339 2018-11-27 2018-11-27 General Circulation Books BKO

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue