000 02355cam a2200577 i 4500
001 u13754
003 SA-PMU
005 20210418123301.0
008 140603s2015 flu b 001 0 eng
010 _a 2014021634
040 _aDLC
_beng
_erda
_cDLC
_dBTCTA
_dYDXCP
_dCDX
_dBDX
_dCRCPR
_dOCLCQ
_dOCLCA
019 _a880966565
_a897561529
_a900709221
020 _a9781482238853
_q(alk. paper)
020 _a1482238853
_q(alk. paper)
035 _a(OCoLC)881205506
_z(OCoLC)880966565
_z(OCoLC)897561529
_z(OCoLC)900709221
042 _apcc
050 0 0 _aHF5549.5.E429
_bA67 2015
082 0 0 _a363.25/202854678
_223
100 1 _aAppel, Edward J.
240 1 0 _aInternet searches for vetting, investigations, and open-source intelligence
245 1 0 _aCybervetting :
_bInternet searches for vetting, investigations, and open-source intelligence /
_cEdward J. Appel.
250 _aSecond edition.
264 1 _aBoca Raton :
_bCRC Press, Taylor & Francis Press,
_c2015.
300 _axix, 302 pages ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _a"Second edition"--Introduction.
500 _aCompletely revised edition of the author's Internet searches for vetting, investigations, and open-source intelligence.
504 _aIncludes bibliographical references and index.
505 0 _aSection 1. Behavior and technology -- section 2. Legal and policy context -- section 3. Framework for internet searching -- section 4. Internet search methodology.
650 0 _aEmployee screening.
650 0 _aCriminal investigation.
650 0 _aInternet searching.
650 0 _aEmployee crimes
_xPrevention.
650 0 _aComputer crimes
_xPrevention.
650 0 _aPersonnel management
_xInformation technology.
650 0 _aBusiness enterprises
_xSecurity measures.
776 0 8 _iElectronic version:
_z9781482238860
938 _aBrodart
_bBROD
_n110429559
938 _aBaker and Taylor
_bBTCP
_nBK0015109870
938 _aCoutts Information Services
_bCOUT
_n28445033
938 _aCRC Press
_bCRCP
_nCRC00K23247000
938 _aYBP Library Services
_bYANK
_n11837758
029 1 _aAU@
_b000053601912
029 1 _aNZ1
_b15796684
942 _cBOOK
994 _aZ0
_bSUPMU
948 _hNO HOLDINGS IN SUPMU - 43 OTHER HOLDINGS
596 _a1 2
999 _c2396
_d2396