<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>02652    a2200241   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20170207154048.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2008032267</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780470278147 (acid-free paper)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">363.25</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
    <subfield code="a">Computer fraud casebook :the bytes that bite -(E-BOOK)</subfield>
    <subfield code="c">edited by Joseph T. Wells.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Hoboken, N.J. :</subfield>
    <subfield code="b">John Wiley,</subfield>
    <subfield code="c">c2009.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xiv, 424 p. ;</subfield>
    <subfield code="c">27 cm.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Chapter 1 Just What the Doctor Ordered (Page-1),Chapter 2 Of Botnets and Bagels: Vaccinating the Hospitalagainst Cybercrime (Page-13),Chapter 3 Pandora&#x2019;s Box (Page-21), Chapter 4 Mail-Order Fraud (Page-35),Chapter 5 Lancelot Gone Missing(Page-45), Chapter 6 Double Trouble (Page-57),Chapter 7 Unimaginable Wealth(Page-67), Chapter 8 Hacked (Page-75),Chapter 9 Bad Education (Page-85),Chapter 10 If Only His Nose Could Grow(Page-97), Chapter 11 Keeping Up with the Jamesons (Page-105),Chapter 12 Imaginary Satellites (Page-115),Chapter 13 Never Pass Your Password (Page-125),Chapter 14 Why Computers and Meth Don&#x2019;t Mix (Page-135),Chapter 15 Fishing in Dangerous Waters (Page-143),Chapter 16 The Man Who Told on Himself (Page-155),Chapter 17 Triple Threat (Page-163),Chapter 18 Swiped (Page-173),Chapter 19 Have Computer, Will Video (Page-181),Chapter 20 Server, We Have a Problem (Page-191),Chapter 21 Do It for the Kids (Page-199),Chapter 22 Moving Money (Page-209),Chapter 23 Operation: Overnight Identity Theft (Page-1),Chapter 24 The Karma of Fraud (Page-231),Chapter 25 Secret Shopper (Page-241),Chapter 26 Would You Like a Receipt? (Page-251), Chapter 27 The Coupon Code Crooks (Page-261),Chapter 28 He Fought the Law (Page-269),Chapter 29 Eyes on the Company Secrets (Page-281),Chapter 30 French Connections(Page-289), Chapter 31 Irreconcilable Differences(Page-299), Chapter 32 Keeping It In the Family (Page-309),Chapter 33 I Due (Page-319),Chapter 34 What Lies Inside the Trojan Horse (Page-329),Chapter 35 Lost in Transition(Page-339), Chapter 36 Superhero Syndrome (Page-351),Chapter 37 Stealing for the Sale (Page-363),Chapter 38 Do as I Say, Not as I Do (Page-371),Chapter 39 Cinderella: One Glass Slipper Just Wasn&#x2019;t Enough (Page-383),Chapter 40 Bloggers: Separating the Wheat from the Chaff(Page-389), Chapter 41 The Campus Con (Page-401),Chapter 42 One for You, One for Me: A Tale of Crooked Insurance (Page-413).</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes</subfield>
    <subfield code="x">Investigation.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Fraud investigation.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Fraud.</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">E-BOOK</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Wells, Joseph T.</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="1">
    <subfield code="3">Table of contents only</subfield>
    <subfield code="u">http://www.loc.gov/catdir/toc/ecip0824/2008032267.html</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">192967</subfield>
    <subfield code="d">192967</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">363.25  COM</subfield>
    <subfield code="p">MCSEB-2346</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
