000706680 000__ 01517cam\a2200409Ii\4500 000706680 001__ 706680 000706680 005__ 20230306140015.0 000706680 006__ m\\\\\o\\d\\\\\\\\ 000706680 007__ cr\un\nnnunnun 000706680 008__ 140729s2014\\\\sz\a\\\\ob\\\\001\0\eng\d 000706680 020__ $$a9783319064161$$qelectronic book 000706680 020__ $$a3319064169$$qelectronic book 000706680 020__ $$z9783319064154 000706680 0247_ $$a10.1007/978-3-319-06416-1$$2doi 000706680 035__ $$aSP(OCoLC)ocn884790547 000706680 035__ $$aSP(OCoLC)884790547 000706680 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDXCP 000706680 049__ $$aISEA 000706680 050_4 $$aK1089 000706680 08204 $$a364.16/8$$223 000706680 1001_ $$aLeslie, Daniel Adeoyé,$$eauthor. 000706680 24510 $$aLegal principles for combatting cyberlaundering$$h[electronic resource] /$$cDaniel Adeoyé Leslie. 000706680 264_1 $$aCham :$$bSpringer,$$c2014. 000706680 300__ $$a1 online resource (xv, 368 pages) :$$billustrations 000706680 336__ $$atext$$btxt$$2rdacontent 000706680 337__ $$acomputer$$bc$$2rdamedia 000706680 338__ $$aonline resource$$bcr$$2rdacarrier 000706680 4901_ $$aLaw, Governance and Technology Series,$$x2352-1902 ;$$vvolume 19 000706680 504__ $$aIncludes bibliographical references and index. 000706680 506__ $$aAccess limited to authorized users. 000706680 650_0 $$aMoney laundering$$xLaw and legislation. 000706680 650_0 $$aComputer crimes$$xLaw and legislation. 000706680 830_0 $$aLaw, governance and technology series ;$$vv.19.$$x2352-1902 000706680 85280 $$bebk$$hSpringerLink 000706680 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-06416-1$$zOnline Access 000706680 909CO $$ooai:library.usi.edu:706680$$pGLOBAL_SET 000706680 980__ $$aEBOOK 000706680 980__ $$aBIB 000706680 982__ $$aEbook 000706680 983__ $$aOnline 000706680 994__ $$a92$$bISE