Stealing the network: how to own an identity
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
c2005
|
Schlagworte: | |
Online-Zugang: | KUBA1 |
Beschreibung: | Added cover title: You are who the computer says you are |
Beschreibung: | xxiv, 333 p. |
ISBN: | 9780080517742 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044082953 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2005 |||| o||u| ||||||eng d | ||
015 | |a GBA538839 |2 dnb | ||
020 | |a 9780080517742 |9 978-0-08-051774-2 | ||
035 | |a (ZDB-30-PAD)EBC254836 | ||
035 | |a (ZDB-89-EBL)EBL254836 | ||
035 | |a (OCoLC)859881756 | ||
035 | |a (DE-599)BVBBV044082953 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-Y3 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Stealing the network |b how to own an identity |c Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor |
246 | 1 | 3 | |a You are who the computer says you are |
264 | 1 | |a Rockland, MA |b Syngress |c c2005 | |
300 | |a xxiv, 333 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Added cover title: You are who the computer says you are | ||
650 | 4 | |a Computer crimes |v Fiction | |
650 | 4 | |a Computer hackers |v Fiction | |
650 | 4 | |a Computer hackers |x Psychology |v Fiction | |
650 | 4 | |a Computer security |v Fiction | |
650 | 4 | |a Identity theft |v Fiction | |
700 | 1 | |a Alder, Raven |e Sonstige |4 oth | |
700 | 1 | |a Long, Johnny |e Sonstige |4 oth | |
700 | 1 | |a Mullen, Timothy M. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-59749-006-7 |
912 | |a ZDB-30-PAD | ||
940 | 1 | |q KUBA1-ZDB-30-PAD-2023 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029489798 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/khifiit/detail.action?docID=254836 |l KUBA1 |p ZDB-30-PAD |q KHI |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804177126747799552 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV044082953 |
collection | ZDB-30-PAD |
ctrlnum | (ZDB-30-PAD)EBC254836 (ZDB-89-EBL)EBL254836 (OCoLC)859881756 (DE-599)BVBBV044082953 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01696nmm a2200457zc 4500</leader><controlfield tag="001">BV044082953</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA538839</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080517742</subfield><subfield code="9">978-0-08-051774-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC254836</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL254836</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859881756</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044082953</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Y3</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network</subfield><subfield code="b">how to own an identity</subfield><subfield code="c">Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">You are who the computer says you are</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiv, 333 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Added cover title: You are who the computer says you are</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield><subfield code="x">Psychology</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identity theft</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alder, Raven</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mullen, Timothy M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-59749-006-7</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">KUBA1-ZDB-30-PAD-2023</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029489798</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/khifiit/detail.action?docID=254836</subfield><subfield code="l">KUBA1</subfield><subfield code="p">ZDB-30-PAD</subfield><subfield code="q">KHI</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044082953 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:43:07Z |
institution | BVB |
isbn | 9780080517742 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029489798 |
oclc_num | 859881756 |
open_access_boolean | |
owner | DE-Y3 |
owner_facet | DE-Y3 |
physical | xxiv, 333 p. |
psigel | ZDB-30-PAD KUBA1-ZDB-30-PAD-2023 ZDB-30-PAD KHI |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress |
record_format | marc |
spelling | Stealing the network how to own an identity Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor You are who the computer says you are Rockland, MA Syngress c2005 xxiv, 333 p. txt rdacontent c rdamedia cr rdacarrier Added cover title: You are who the computer says you are Computer crimes Fiction Computer hackers Fiction Computer hackers Psychology Fiction Computer security Fiction Identity theft Fiction Alder, Raven Sonstige oth Long, Johnny Sonstige oth Mullen, Timothy M. Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 1-59749-006-7 |
spellingShingle | Stealing the network how to own an identity Computer crimes Fiction Computer hackers Fiction Computer hackers Psychology Fiction Computer security Fiction Identity theft Fiction |
title | Stealing the network how to own an identity |
title_alt | You are who the computer says you are |
title_auth | Stealing the network how to own an identity |
title_exact_search | Stealing the network how to own an identity |
title_full | Stealing the network how to own an identity Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor |
title_fullStr | Stealing the network how to own an identity Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor |
title_full_unstemmed | Stealing the network how to own an identity Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor |
title_short | Stealing the network |
title_sort | stealing the network how to own an identity |
title_sub | how to own an identity |
topic | Computer crimes Fiction Computer hackers Fiction Computer hackers Psychology Fiction Computer security Fiction Identity theft Fiction |
topic_facet | Computer crimes Fiction Computer hackers Fiction Computer hackers Psychology Fiction Computer security Fiction Identity theft Fiction |
work_keys_str_mv | AT alderraven stealingthenetworkhowtoownanidentity AT longjohnny stealingthenetworkhowtoownanidentity AT mullentimothym stealingthenetworkhowtoownanidentity AT alderraven youarewhothecomputersaysyouare AT longjohnny youarewhothecomputersaysyouare AT mullentimothym youarewhothecomputersaysyouare |