MARC details
000 -LEADER |
fixed length control field |
03946nam a22006618i 4500 |
001 - CONTROL NUMBER |
control field |
BDZ0050255835 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
StDuBDS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230331113849.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m|||||o||d|||||||| |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220413s2022 enk fo 000|0|eng|d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781780175867 (PDF ebook) : |
Terms of availability |
22.49 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
StDuBDS |
Language of cataloging |
eng |
Description conventions |
rda |
-- |
pn |
Transcribing agency |
StDuBDS |
Modifying agency |
StDuBDSZ |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
CRI |
Source |
ukslc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
JK |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URH |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URJ |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URS |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URW |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URY |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
JK |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URH |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URJ |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URS |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URW |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URY |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URD |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
364.163 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Wade, Todd, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cybercrime : |
Remainder of title |
protecting your business, your family and yourself / |
Statement of responsibility, etc. |
Todd Wade. |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
202206 |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
London : |
Name of producer, publisher, distributor, manufacturer |
BCS, |
Date of production, publication, distribution, manufacture, or copyright notice |
2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (180 pages) |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Source |
rdacarrier |
366 ## - TRADE AVAILABILITY INFORMATION |
Detailed date of publication |
20220615 |
Availability status code |
Available |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- Impersonation Cyber Frauds -- Cyber Advance-fee Threats -- Cyber Investment Fraud -- Cyber Identity Theft -- Cyber Extortion -- Cyber Sextortion -- Conclusion |
520 8# - SUMMARY, ETC. |
Summary, etc. |
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim. |
Expansion of summary note |
Cybercrime is a sad, ever-developing reality of our digital lives. Cybercriminals are ruthless and know how to use persuasion and manipulation to get what they want. We are all in danger of falling victim to their tricks, which can lead to serious consequences for our business, our family and ourselves. Cybercrime is a broad topic. This book isn't an attempt to cover all types of cybercrime. It will cover the two most common and most costly types of cybercrime seen today for individuals and businesses: cyber fraud and cyber extortion. There are four categories of cyber fraud (impersonation fraud, advance- fee fraud, investment fraud, identity theft) and two categories of cyber extortion (cyber extortion and sextortion). There's a chapter for each of these categories, with coverage including key methodologies, attack methods cybercriminals use, advice on how to protect yourself to avoid becoming a victim, and what to do if you do find yourself in the situation of being a victim of cybercrime. Historical examples of the type of fraud or extortion will be shown, explaining and demonstrating how the same methods are still in use today, albeit in a modern context - cyber. Real cases of cybercrime will be reviewed and dissected. Glimpses of how future attacks might look will be shown. Cybercriminals target everyone. It does not matter if you are at work or at home. They will go after your family, including your children. Reading this book will help you to be prepared for when that occurs. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Description based on CIP data; resource not viewed. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer fraud. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Internet fraud. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
True Crime. |
Source of heading or term |
ukslc |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Social services & welfare, criminology |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer fraud & hacking |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer viruses, Trojans & worms |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Spam |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Spyware |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Privacy & data protection |
Source of heading or term |
thema |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version : |
International Standard Book Number |
9781780175850 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&accId=8832856&isbn=9781780175867">https://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&accId=8832856&isbn=9781780175867</a> |
Public note |
Open e-book |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |