Internet Searches for Vetting, Investigations, and Open-Source Intelligence (Record no. 1557)

MARC details
000 -LEADER
fixed length control field 03208 a2200457 4500
001 - CONTROL NUMBER
control field 1138112232
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250317100404.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250312042017GB 5 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138112230
037 ## - SOURCE OF ACQUISITION
Source of stock number/acquisition Taylor & Francis
Terms of availability GBP 74.99
Form of issue BB
040 ## - CATALOGING SOURCE
Original cataloging agency 01
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
072 7# - SUBJECT CATEGORY CODE
Subject category code UY
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code UBL
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code KC
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code KJMV2
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code JB
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code JKV
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code KNS
Source thema
072 7# - SUBJECT CATEGORY CODE
Subject category code UY
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code UBL
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code KC
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code KJMV2
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code JF
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code UR
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code JKV
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code KNSS
Source bic
072 7# - SUBJECT CATEGORY CODE
Subject category code BUS030000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code BUS041000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code HIS027000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code LAW041000
Source bisac
072 7# - SUBJECT CATEGORY CODE
Subject category code 303.4833
Source bisac
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Edward J. Appel
245 10 - TITLE STATEMENT
Title Internet Searches for Vetting, Investigations, and Open-Source Intelligence
Remainder of title Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition
250 ## - EDITION STATEMENT
Edition statement 1
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Oxford
Name of publisher, distributor, etc. CRC Press
Date of publication, distribution, etc. 20170531
300 ## - PHYSICAL DESCRIPTION
Extent 320 p
520 ## - SUMMARY, ETC.
Expansion of summary note In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security. Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities. Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.

No items available.