Presents an introduction to different types of computer-based crime, and discusses the efforts of law enforcement officials to find and stop cyberspace criminals.
hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
23744 | 3912652 | 2249 | 482096 | 121926 | ATTH | 94 | ATTH22118 | 364.16 GRA | 364.16 | 1575485655 | 1709567815 |
1332081 | 4996230 | 2181 | 482096 | 121926 | PIBR | 382 | PIBR080165 | 364.16 GRA | 364.16 | 1581465224 | 1708963493 |
1342154 | 5005551 | 2182 | 482096 | 121926 | PICR | 383 | PICR420817 | 364.16 GRA | 364.16 | 1581465224 | 1708963493 |
1819055 | 5420591 | 1779 | 482096 | 121926 | CCHS | 138 | CCHS101894 | 364.16 GRA | 364.16 | 1582575937 | 1662467957 |
1836062 | 5435486 | 1780 | 482096 | 121926 | CCMS | 139 | CCMS095331 | 364.16 GRANT-ADAMSON | 364.16 | 1582575937 | 1662467957 |