Presents an introduction to different types of computer-based crime, and discusses the efforts of law enforcement officials to find and stop cyberspace criminals.
| hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 23744 | 3912652 | 2249 | 482096 | 121926 | ATTH | 94 | ATTH22118 | 364.16 GRA | 364.16 | 1575485655 | 1709567815 |
| 1332081 | 4996230 | 2323 | 482096 | 121926 | PIBR | 382 | PIBR080165 | 364.16 GRA | 364.16 | 1581465224 | 1736518457 |
| 1342154 | 5005551 | 2324 | 482096 | 121926 | PICR | 383 | PICR420817 | 364.16 GRA | 364.16 | 1581465224 | 1736518457 |
| 1819055 | 5420591 | 2438 | 482096 | 121926 | CCHS | 138 | CCHS101894 | 364.16 GRA | 364.16 | 1582575937 | 1742569409 |
| 1836062 | 5435486 | 2439 | 482096 | 121926 | CCMS | 139 | CCMS095331 | 364.16 GRANT-ADAMSON | 364.16 | 1582575937 | 1742569409 |