<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Computer fraud casebook :the bytes that bite -(E-BOOK)</title>
  </titleInfo>
  <name type="personal">
    <namePart>Wells, Joseph T.</namePart>
  </name>
  <typeOfResource/>
  <originInfo>
    <place>
      <placeTerm type="text">Hoboken, N.J</placeTerm>
    </place>
    <publisher>John Wiley</publisher>
    <dateIssued>c2009</dateIssued>
    <issuance/>
  </originInfo>
  <physicalDescription>
    <extent>xiv, 424 p. ; 27 cm.</extent>
  </physicalDescription>
  <tableOfContents>Chapter 1 Just What the Doctor Ordered (Page-1),Chapter 2 Of Botnets and Bagels: Vaccinating the Hospitalagainst Cybercrime (Page-13),Chapter 3 Pandora’s Box (Page-21), Chapter 4 Mail-Order Fraud (Page-35),Chapter 5 Lancelot Gone Missing(Page-45), Chapter 6 Double Trouble (Page-57),Chapter 7 Unimaginable Wealth(Page-67), Chapter 8 Hacked (Page-75),Chapter 9 Bad Education (Page-85),Chapter 10 If Only His Nose Could Grow(Page-97), Chapter 11 Keeping Up with the Jamesons (Page-105),Chapter 12 Imaginary Satellites (Page-115),Chapter 13 Never Pass Your Password (Page-125),Chapter 14 Why Computers and Meth Don’t Mix (Page-135),Chapter 15 Fishing in Dangerous Waters (Page-143),Chapter 16 The Man Who Told on Himself (Page-155),Chapter 17 Triple Threat (Page-163),Chapter 18 Swiped (Page-173),Chapter 19 Have Computer, Will Video (Page-181),Chapter 20 Server, We Have a Problem (Page-191),Chapter 21 Do It for the Kids (Page-199),Chapter 22 Moving Money (Page-209),Chapter 23 Operation: Overnight Identity Theft (Page-1),Chapter 24 The Karma of Fraud (Page-231),Chapter 25 Secret Shopper (Page-241),Chapter 26 Would You Like a Receipt? (Page-251), Chapter 27 The Coupon Code Crooks (Page-261),Chapter 28 He Fought the Law (Page-269),Chapter 29 Eyes on the Company Secrets (Page-281),Chapter 30 French Connections(Page-289), Chapter 31 Irreconcilable Differences(Page-299), Chapter 32 Keeping It In the Family (Page-309),Chapter 33 I Due (Page-319),Chapter 34 What Lies Inside the Trojan Horse (Page-329),Chapter 35 Lost in Transition(Page-339), Chapter 36 Superhero Syndrome (Page-351),Chapter 37 Stealing for the Sale (Page-363),Chapter 38 Do as I Say, Not as I Do (Page-371),Chapter 39 Cinderella: One Glass Slipper Just Wasn’t Enough (Page-383),Chapter 40 Bloggers: Separating the Wheat from the Chaff(Page-389), Chapter 41 The Campus Con (Page-401),Chapter 42 One for You, One for Me: A Tale of Crooked Insurance (Page-413).</tableOfContents>
  <note type="statement of responsibility">edited by Joseph T. Wells.</note>
  <subject authority="lcsh">
    <topic>Computer crimes</topic>
    <topic>Investigation</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer crimes</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Fraud investigation</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Fraud</topic>
  </subject>
  <subject>
    <geographic>E-BOOK</geographic>
  </subject>
  <classification authority="ddc">363.25</classification>
  <identifier type="isbn">9780470278147 (acid-free paper)</identifier>
  <identifier type="lccn">2008032267</identifier>
  <identifier type="uri">http://www.loc.gov/catdir/toc/ecip0824/2008032267.html</identifier>
  <location>
    <url displayLabel="Table of contents only">http://www.loc.gov/catdir/toc/ecip0824/2008032267.html</url>
  </location>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordChangeDate encoding="iso8601">20170207154048.0</recordChangeDate>
  </recordInfo>
</mods>
