Cybercrime : (Record no. 83152)

MARC details
000 -LEADER
fixed length control field 03946nam a22006618i 4500
001 - CONTROL NUMBER
control field BDZ0050255835
003 - CONTROL NUMBER IDENTIFIER
control field StDuBDS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230331113849.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m|||||o||d||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220413s2022 enk fo 000|0|eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781780175867 (PDF ebook) :
Terms of availability 22.49
040 ## - CATALOGING SOURCE
Original cataloging agency StDuBDS
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency StDuBDS
Modifying agency StDuBDSZ
072 #7 - SUBJECT CATEGORY CODE
Subject category code CRI
Source ukslc
072 #7 - SUBJECT CATEGORY CODE
Subject category code JK
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URH
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URS
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URW
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code JK
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URH
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URJ
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URS
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URW
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URD
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.163
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Wade, Todd,
Relator term author.
245 10 - TITLE STATEMENT
Title Cybercrime :
Remainder of title protecting your business, your family and yourself /
Statement of responsibility, etc. Todd Wade.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 202206
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London :
Name of producer, publisher, distributor, manufacturer BCS,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (180 pages)
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
366 ## - TRADE AVAILABILITY INFORMATION
Detailed date of publication 20220615
Availability status code Available
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Impersonation Cyber Frauds -- Cyber Advance-fee Threats -- Cyber Investment Fraud -- Cyber Identity Theft -- Cyber Extortion -- Cyber Sextortion -- Conclusion
520 8# - SUMMARY, ETC.
Summary, etc. With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Expansion of summary note Cybercrime is a sad, ever-developing reality of our digital lives. Cybercriminals are ruthless and know how to use persuasion and manipulation to get what they want. We are all in danger of falling victim to their tricks, which can lead to serious consequences for our business, our family and ourselves. Cybercrime is a broad topic. This book isn't an attempt to cover all types of cybercrime. It will cover the two most common and most costly types of cybercrime seen today for individuals and businesses: cyber fraud and cyber extortion. There are four categories of cyber fraud (impersonation fraud, advance- fee fraud, investment fraud, identity theft) and two categories of cyber extortion (cyber extortion and sextortion). There's a chapter for each of these categories, with coverage including key methodologies, attack methods cybercriminals use, advice on how to protect yourself to avoid becoming a victim, and what to do if you do find yourself in the situation of being a victim of cybercrime. Historical examples of the type of fraud or extortion will be shown, explaining and demonstrating how the same methods are still in use today, albeit in a modern context - cyber. Real cases of cybercrime will be reviewed and dissected. Glimpses of how future attacks might look will be shown. Cybercriminals target everyone. It does not matter if you are at work or at home. They will go after your family, including your children. Reading this book will help you to be prepared for when that occurs.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on CIP data; resource not viewed.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer fraud.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet fraud.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element True Crime.
Source of heading or term ukslc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Social services & welfare, criminology
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer fraud & hacking
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer viruses, Trojans & worms
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Spam
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Spyware
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Privacy & data protection
Source of heading or term thema
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version :
International Standard Book Number 9781780175850
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&accId=8832856&isbn=9781780175867">https://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&accId=8832856&isbn=9781780175867</a>
Public note Open e-book
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Date last seen Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     Electronic publication Electronic publication 30/03/2023 70 44.98   30/03/2023 44.98 30/03/2023 E-book