|
|
|
|
LEADER |
03089nmm a2200649 u 4500 |
001 |
EB001916155 |
003 |
EBX01000000000000001079057 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0429256388
|
020 |
|
|
|a 1482238861
|
020 |
|
|
|a 9781482238860
|
050 |
|
4 |
|a HF5549.5.E429
|
100 |
1 |
|
|a Appel, Edward J.
|
130 |
0 |
|
|a Internet searches for vetting, investigations, and open-source intelligence
|
245 |
0 |
0 |
|a Cybervetting
|b internet searches for vetting, investigations, and open-source intelligence
|c Edward J. Appel, Sr
|
250 |
|
|
|a 2nd ed
|
260 |
|
|
|a Boca Raton, Fla.
|b CRC Press
|c 2015
|
300 |
|
|
|a 1 online resource
|
505 |
0 |
|
|a Section 1. Behavior and technology -- section 2. Legal and policy context -- section 3. Framework for internet searching -- section 4. Internet search methodology
|
505 |
0 |
|
|a Includes bibliographical references
|
653 |
|
|
|a Personnel management / Information technology
|
653 |
|
|
|a Recherche sur Internet
|
653 |
|
|
|a BUSINESS & ECONOMICS / Infrastructure / bisacsh
|
653 |
|
|
|a Entreprises / Sécurité / Mesures
|
653 |
|
|
|a Employee screening / fast
|
653 |
|
|
|a Business enterprises / Security measures
|
653 |
|
|
|a SOCIAL SCIENCE / General / bisacsh
|
653 |
|
|
|a Criminal investigation / fast
|
653 |
|
|
|a Computer crimes / Prevention / fast
|
653 |
|
|
|a Internet searching / http://id.loc.gov/authorities/subjects/sh98006428
|
653 |
|
|
|a Personnel / Direction / Technologie de l'information
|
653 |
|
|
|a Personnel / Présélection
|
653 |
|
|
|a Employee crimes / Prevention / fast
|
653 |
|
|
|a Employee crimes / Prevention
|
653 |
|
|
|a Employee screening / http://id.loc.gov/authorities/subjects/sh95000814
|
653 |
|
|
|a Business enterprises / Security measures / fast
|
653 |
|
|
|a Internet searching / fast
|
653 |
|
|
|a Enquêtes criminelles
|
653 |
|
|
|a Criminal investigation / http://id.loc.gov/authorities/subjects/sh85034045
|
653 |
|
|
|a Computer crimes / Prevention
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
028 |
5 |
0 |
|a 10.1201/b17651
|
776 |
|
|
|z 9781482238853
|
776 |
|
|
|z 9781482238860
|
776 |
|
|
|z 1482238861
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781482238853/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 363.25/202854678
|
082 |
0 |
|
|a 658.3
|
082 |
0 |
|
|a 658
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 364.1
|
082 |
0 |
|
|a 338
|
082 |
0 |
|
|a 330
|
520 |
|
|
|a Researching an individual's, firm's or brand's online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition examines our society's growing dependence on networked systems, exploring how individuals, businesses, and governments have embraced the Internet, in
|