It looks like you're offline.
Open Library logo
additional options menu
⚠ Urge publishers to restore access to 500,000 removed library books: Sign Letter - Learn More

MARC Record from Library of Congress

Record ID marc_loc_updates/v40.i30.records.utf8:8176216:1417
Source Library of Congress
Download Link /show-records/marc_loc_updates/v40.i30.records.utf8:8176216:1417?format=raw

LEADER: 01417cam a2200325 a 4500
001 2010039208
003 DLC
005 20120720084832.0
008 100920s2012 njua j b 001 0 eng
010 $a 2010039208
020 $a9780766036680 (hbk.)
020 $a0766036685 (hbk.)
020 $a9781598453614 (pbk.)
020 $a1598453610 (pbk.)
035 $a(OCoLC)ocn665064409
040 $aDLC$beng$cDLC$dIG#$dYDXCP$dBDX$dIHI$dBTCTA$dDLC
042 $alcac
050 00 $aHV6773$b.L38 2012
082 00 $a364.16/8$223
100 1 $aLatta, Sara L.
245 10 $aCybercrime :$bdata trails do tell tales /$cSara L. Latta.
260 $aBerkeley Heights, NJ :$bEnslow Publishers,$cc2012.
300 $a104 p. :$bcol. ill. ;$c24 cm.
490 1 $aTrue forensic crime stories
504 $aIncludes bibliographical references (p. 101) and index.
505 0 $aCyber crime doesn't pay -- Phone phreaks and hackers: the history of cyber crime -- Viruses, bots, and zombies-oh my! -- You've got spam! -- Arrgh, matey! internet piracy is no joke -- Cyber cops -- So you want to be a digital detective?.
520 $a"Read about this history of cybercrime, and learn about the different types of scams--from phising to spam to hacking--that take place on the internet"--Provided by publisher.
650 0 $aComputer crimes$vJuvenile literature.
650 1 $aComputer crimes.
830 0 $aTrue forensic crime stories.