LEADER 02268nam 2200577Ia 450 001 9910785433303321 005 20200520144314.0 010 $a1-282-82040-0 010 $a9786612820403 010 $a0-8108-7681-7 035 $a(CKB)2670000000060160 035 $a(EBL)662320 035 $a(OCoLC)676738395 035 $a(SSID)ssj0000421785 035 $a(PQKBManifestationID)12109196 035 $a(PQKBTitleCode)TC0000421785 035 $a(PQKBWorkID)10412635 035 $a(PQKB)10969363 035 $a(MiAaPQ)EBC662320 035 $a(Au-PeEL)EBL662320 035 $a(CaPaEBR)ebr10421473 035 $a(CaONFJC)MIL282040 035 $a(EXLCZ)992670000000060160 100 $a20100329d2010 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe last silent picture show$b[electronic resource] $esilent films on American screens in the 1930s /$fWilliam M. Drew 210 $aLanham $cScarecrow Press, Inc.$d2010 215 $a1 online resource (269 p.) 300 $aDescription based upon print version of record. 311 $a0-8108-7680-9 320 $aIncludes bibliographical references and index. 327 $aContents; Acknowledgments; Introduction; Prologue; Ch01. A Little Silence amid All the Talk; Ch02. Silents with Sound and Fury; Ch03. Not Wired for Sound; Ch04. Mary and Charlie vs. the World; Ch05. A Silent Revolution; Ch06. The Silent East; Ch07. Of Art and Archives; Ch08. The Sheik Returns!; Ch09. The Silents Go on Forever; Index; About the Author 330 $aThis book details the fate of an entire art form-the silent cinema-in the United States during the 1930's and how it managed to survive the onslaught of sound. 606 $aSilent films$zUnited States$xHistory and criticism 606 $aMotion pictures$zUnited States$xHistory$y20th century 615 0$aSilent films$xHistory and criticism. 615 0$aMotion pictures$xHistory 676 $a791.430973 686 $a24.34$2bcl 700 $aDrew$b William M$0777658 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910785433303321 996 $aThe last silent picture show$93722757 997 $aUNINA LEADER 03808nam 2200697Ia 450 001 9911019242503321 005 20200520144314.0 010 $a9786612027949 010 $a9781119197416 010 $a1119197414 010 $a9781282027947 010 $a1282027948 010 $a9780470488928 010 $a0470488921 010 $a9780470436486 010 $a0470436484 035 $a(CKB)1000000000719653 035 $a(EBL)427888 035 $a(OCoLC)428967042 035 $a(SSID)ssj0000127796 035 $a(PQKBManifestationID)12019347 035 $a(PQKBTitleCode)TC0000127796 035 $a(PQKBWorkID)10054531 035 $a(PQKB)11297485 035 $a(MiAaPQ)EBC427888 035 $a(Perlego)1008642 035 $a(EXLCZ)991000000000719653 100 $a20080725d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComputer fraud casebook $ethe bytes that bite /$fedited by Joseph T. Wells 210 $aHoboken, NJ $cWiley$dc2009 215 $a1 online resource (443 p.) 300 $aIncludes index. 311 08$a9780470278147 311 08$a0470278145 327 $aCOMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't Mix 327 $aChapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the Family 327 $aChapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; Index 330 $aThis one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive picture of the many types of computer fraud how they are investigated, across industries and throughout the world. Topics included are email fraud, on-line auction fraud, security breaches, counterfeiting, and others. 606 $aComputer crimes 606 $aComputer crimes$xInvestigation 606 $aFraud 606 $aFraud investigation 615 0$aComputer crimes. 615 0$aComputer crimes$xInvestigation. 615 0$aFraud. 615 0$aFraud investigation. 676 $a342.5268 676 $a363.259680973 701 $aWells$b Joseph T$0866165 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019242503321 996 $aComputer fraud casebook$94421716 997 $aUNINA