MARC details
| 000 -LEADER |
| fixed length control field |
04400nam a2200301 i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CSPC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250908131958.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
250324s2023 -uka 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781803234984 |
| 040 ## - CATALOGING SOURCE |
| Transcribing agency |
CSPC |
| Original cataloging agency |
CSPC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| 050 04 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
HV6773 |
| Item number |
.N43 2023 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
364.168 |
| Item number |
N27c |
| Edition number |
23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Nearchou, Nearchos, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Combating crime on the dark web : |
| Remainder of title |
learn how to access the dark web safely and not fall victim to cybercrime / |
| Statement of responsibility, etc. |
Nearchos Nearchou. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
First edition. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Birmingham, UK : |
| Name of producer, publisher, distributor, manufacturer |
Packt Publishing, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2023. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xiv, 123 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Source |
rdacarrier |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Introduction to cybercrime and dark web's history -- An introduction to cybercrime -- An introduction to the dark web -- The dark web's ecosystem and major crimes -- Drug markets on the dark web -- Child pornography on the dark web -- Human trafficking on the dark web -- Cyberterrorism on the dark web -- Efforts for combating crime on the dark web -- System for combating crime on the dark web -- Discussion and evaluation. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threats Key Features Get up to speed with the ins and outs of cybercriminal activity on the dark web Become familiar with the tools and techniques that are used to fight serious crime Gain a keen understanding of the crime ecosystem on the dark web and the best practices to keep it in check Book Description In today's world, the crime-prevention landscape is impossible to navigate. The dark web means new frontiers of combat against bad actors that pop up daily. Everyone from narcotics dealers to human traffickers are exploiting the dark web to evade authorities. If you want to find your feet in this tricky terrain and fight crime on the dark web, take this comprehensive, easy-to-follow cyber security guide with you. Combating Crime on the Dark Web contains everything you need to be aware of when tackling the world of the dark web. Step by step, you'll gain acumen in the tactics that cybercriminals are adopting and be equipped with the arsenal of strategies that are available to you as a cybersecurity specialist. This cyber security book ensures that you are well acquainted with all the latest techniques to combat dark web criminality. After a primer on cybercrime and the history of the dark web, you'll dive right into the main domains of the dark web ecosystem, reaching a working understanding of how drug markets, child pornography, and human trafficking operate. Once well-versed with the functioning of criminal groups, you'll be briefed on the most effective tools and methods being employed by law enforcement, tech companies, and others to combat such crimes, developing both a toolkit and a mindset that can help you stay safe from such criminal activities and can be applied in any sector or domain. By the end of this book, you'll be well prepared to begin your pushback against the criminal elements of the dark web. What you will learn Understand the history of cybercrime, the dark web, and the use of Tor Discover the ecosystem of dark web drug markets Become familiar with the methods law enforcement use to stop child abusers Dive deep into real-life human trafficking cases and how they were tackled Explore sting operations, honeypots, and cybercrime prevention methodologies Gain expertise in Pipl Search, MEMEX, BITCRIME, and other anti-crime tools Investigate open-source intelligence and intelligence-led policing Set up a framework for disrupting organized crime on the dark web Who this book is for This book is for aspiring cybercrime investigators, cybersecurity enthusiasts, and anyone else who is interested in learning about this dark side of the internet. The book mainly focuses on preventing crimes on the dark web and is written in a simple way so that you can understand it with ease." |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Dark web. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer crimes |
| General subdivision |
Prevention. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Suppress in OPAC |
No |
| Koha item type |
Books |
| Classification part |
364.168 |
| Call number prefix |
CIR |
| Call number suffix |
2023 |
| Edition |
23 |