Cybervetting (Record no. 6568)

MARC details
000 -LEADER
fixed length control field 01785nam a2200289Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250924120218.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220909b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781482238853
037 ## - SOURCE OF ACQUISITION
Terms of availability Textbook
040 ## - CATALOGING SOURCE
Original cataloging agency CSL
Language of cataloging eng
Transcribing agency CSL
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
084 ## - COLON CLASSIFICATION NUMBER
Classification number D65,8(B):(894) Q5 TY
Assigning agency CSL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Appel, Edward J
Relator term author
9 (RLIN) 846438
245 #0 - TITLE STATEMENT
Title Cybervetting
Remainder of title : Internet searches for vetting, investigations, and open-source intelligence
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 302p.
Other physical details : ill.
500 ## - GENERAL NOTE
General note Index 289-302p.
520 ## - SUMMARY, ETC.
Summary, etc. Researching an individual’s, firm’s or brand’s online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition examines our society’s growing dependence on networked systems, exploring how individuals, businesses, and governments have embraced the Internet, including social networking for communications and transactions. It presents two previously unpublished studies of the effectiveness of cybervetting, and provides best practices for ethical cybervetting, advocating strengthened online security.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Finding sources
9 (RLIN) 846439
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Insider threat
9 (RLIN) 846440
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet search studies
9 (RLIN) 846441
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Behavior online
9 (RLIN) 846442
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Classification part D65,8(B):(894) Q5 TY
Koha item type Textbook
Source of classification or shelving scheme Colon Classification (CC)
Suppress in OPAC No
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Central Science Library Central Science Library 2022-09-12 1358, 23/03/2015, The Book Seller   D65,8(B):(894) Q5 TY SL1598309 2022-09-12 2022-09-12 Textbook
Copyright @ Delhi University Library System