Software piracy exposed:
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epi...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
© 2005
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software |
Beschreibung: | 1 online resource (xvi, 310 pages) illustrations |
ISBN: | 1423754239 9781423754237 1932266984 9781932266986 9780080489735 0080489737 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046127149 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2005 |||| o||u| ||||||eng d | ||
020 | |a 1423754239 |9 1-4237-5423-9 | ||
020 | |a 9781423754237 |9 978-1-4237-5423-7 | ||
020 | |a 1932266984 |9 1-932266-98-4 | ||
020 | |a 9781932266986 |9 978-1-932266-98-6 | ||
020 | |a 9780080489735 |9 978-0-08-048973-5 | ||
020 | |a 0080489737 |9 0-08-048973-7 | ||
035 | |a (ZDB-33-ESD)ocm64185782 | ||
035 | |a (OCoLC)64185782 | ||
035 | |a (DE-599)BVBBV046127149 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 364.168 |2 22 | |
100 | 1 | |a Craig, Paul |e Verfasser |4 aut | |
245 | 1 | 0 | |a Software piracy exposed |c Paul Craig, Ron Honick ; Mark Burnett, technical editor |
264 | 1 | |a Rockland, MA |b Syngress |c © 2005 | |
300 | |a 1 online resource (xvi, 310 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software | ||
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 7 | |a Acquisition of computer software |2 fast | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Electronic book collection | |
650 | 4 | |a Acquisition of computer software | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer security | |
700 | 1 | |a Honick, Ron |e Sonstige |4 oth | |
700 | 1 | |a Burnett, Mark |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781932266986 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031507603 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781932266986 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180447981207552 |
---|---|
any_adam_object | |
author | Craig, Paul |
author_facet | Craig, Paul |
author_role | aut |
author_sort | Craig, Paul |
author_variant | p c pc |
building | Verbundindex |
bvnumber | BV046127149 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm64185782 (OCoLC)64185782 (DE-599)BVBBV046127149 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02723nmm a2200493zc 4500</leader><controlfield tag="001">BV046127149</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754239</subfield><subfield code="9">1-4237-5423-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754237</subfield><subfield code="9">978-1-4237-5423-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266984</subfield><subfield code="9">1-932266-98-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266986</subfield><subfield code="9">978-1-932266-98-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489735</subfield><subfield code="9">978-0-08-048973-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489737</subfield><subfield code="9">0-08-048973-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm64185782</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64185782</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046127149</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Craig, Paul</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software piracy exposed</subfield><subfield code="c">Paul Craig, Ron Honick ; Mark Burnett, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 310 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Acquisition of computer software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic book collection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Acquisition of computer software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Honick, Ron</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Burnett, Mark</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781932266986</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507603</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781932266986</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046127149 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:55Z |
institution | BVB |
isbn | 1423754239 9781423754237 1932266984 9781932266986 9780080489735 0080489737 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507603 |
oclc_num | 64185782 |
open_access_boolean | |
physical | 1 online resource (xvi, 310 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress |
record_format | marc |
spelling | Craig, Paul Verfasser aut Software piracy exposed Paul Craig, Ron Honick ; Mark Burnett, technical editor Rockland, MA Syngress © 2005 1 online resource (xvi, 310 pages) illustrations txt rdacontent c rdamedia cr rdacarrier This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software TRUE CRIME / White Collar Crime bisacsh Acquisition of computer software fast Computer crimes fast Computer security fast Electronic book collection Acquisition of computer software Computer crimes Computer security Honick, Ron Sonstige oth Burnett, Mark Sonstige oth http://www.sciencedirect.com/science/book/9781932266986 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Craig, Paul Software piracy exposed TRUE CRIME / White Collar Crime bisacsh Acquisition of computer software fast Computer crimes fast Computer security fast Electronic book collection Acquisition of computer software Computer crimes Computer security |
title | Software piracy exposed |
title_auth | Software piracy exposed |
title_exact_search | Software piracy exposed |
title_full | Software piracy exposed Paul Craig, Ron Honick ; Mark Burnett, technical editor |
title_fullStr | Software piracy exposed Paul Craig, Ron Honick ; Mark Burnett, technical editor |
title_full_unstemmed | Software piracy exposed Paul Craig, Ron Honick ; Mark Burnett, technical editor |
title_short | Software piracy exposed |
title_sort | software piracy exposed |
topic | TRUE CRIME / White Collar Crime bisacsh Acquisition of computer software fast Computer crimes fast Computer security fast Electronic book collection Acquisition of computer software Computer crimes Computer security |
topic_facet | TRUE CRIME / White Collar Crime Acquisition of computer software Computer crimes Computer security Electronic book collection |
url | http://www.sciencedirect.com/science/book/9781932266986 |
work_keys_str_mv | AT craigpaul softwarepiracyexposed AT honickron softwarepiracyexposed AT burnettmark softwarepiracyexposed |