<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01429    a2200289   4500</leader>
  <controlfield tag="003">NUST</controlfield>
  <controlfield tag="005">20230102131415.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">   96133472</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">1565920864</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
    <subfield code="a">364.168,ICO</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Icove, David J.,</subfield>
    <subfield code="9">106624</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Computer crime :</subfield>
    <subfield code="b">a crimefighter's handbook /</subfield>
    <subfield code="c">David Icove, Karl Seger, and William VonStorch.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
    <subfield code="a">1st ed.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Sebastopol, CA :</subfield>
    <subfield code="b">O'Reilly &amp; Associates,</subfield>
    <subfield code="c">1995.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xxi, 437 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Introduction to computer crime (Page-1), What are the crimes (Page-29), Who commits computer crimes (Page-61), What are the laws (Page-71), What is at risk (Page-89),Physical security (Page-103), Communications security (Page-129), Handing Computer Crime (Page-155), Part 4:- Computer Crime Laws (Page-203), Part 5:- Appendices (Page-351). </subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes.</subfield>
    <subfield code="9">18532</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security.</subfield>
    <subfield code="9">570</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computers</subfield>
    <subfield code="x">Law and legislation</subfield>
    <subfield code="z">United States.</subfield>
    <subfield code="9">85540</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Electronic data processing departments</subfield>
    <subfield code="x">Security measures.</subfield>
    <subfield code="9">95063</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Seger, Karl A.,</subfield>
    <subfield code="d">1940-</subfield>
    <subfield code="9">106625</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">VonStorch, William R.</subfield>
    <subfield code="9">106626</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Contributor biographical information</subfield>
    <subfield code="u">http://www.loc.gov/catdir/enhancements/fy0915/96133472-b.html</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Publisher description</subfield>
    <subfield code="u">http://www.loc.gov/catdir/enhancements/fy0915/96133472-d.html</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
    <subfield code="k">364.168,ICO</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">184185</subfield>
    <subfield code="d">184185</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">GEN</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="o">364.168,ICO</subfield>
    <subfield code="p">MCS26678</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
    <subfield code="z">Almirah No.54, Shelf No.1</subfield>
  </datafield>
</record>
