Normal view
MARC view
Entry Topical Term
001 - CONTROL NUMBER
- control field: 3217
003 - CONTROL NUMBER IDENTIFIER
- control field: DLC
005 - DATE AND TIME OF LATEST TRANSACTION
- control field: 20220628151629.0
008 - FIXED-LENGTH DATA ELEMENTS
- fixed length control field: 060303i| anannbabn |a ana
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
- LC control number: sh 85029493
040 ## - CATALOGING SOURCE
- Original cataloging agency: DLC
- Transcribing agency: DLC
- Modifying agency: DLC
- Modifying agency: MMiltC
- Modifying agency: ViU
053 #0 - LC CLASSIFICATION NUMBER
- Classification number element-single number or beginning number of span: HV8079.C65
150 #0 - HEADING--TOPICAL TERM
- Topical term or geographic name entry element: Computer crimes
- General subdivision: Investigation.
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computer forensics
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Cyber forensics
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Cyberforensics
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Internet forensics
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Control subfield: g
- Topical term or geographic name entry element: Criminal investigation
670 ## - SOURCE DATA FOUND
- Source citation: Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes, c2002.
670 ## - SOURCE DATA FOUND
- Source citation: Shinder, D.L. Scene of the cybercrime : computer forensics handbook, c2002.
670 ## - SOURCE DATA FOUND
- Source citation: Woodson, M.L. The future technological needs of cyber forensics tools, c2002.
670 ## - SOURCE DATA FOUND
- Source citation: Britz, M. Computer forensics and cyber crime, c2004.
670 ## - SOURCE DATA FOUND
- Source citation: Jones, R. Internet forensics, c2006:
- Information found: p. 1 (computer forensics studies how computers are involved in commission of crimes, internet forensics shifts focus from individual computer and hard drive to the internet at large)