Fancy bear goes phishing: the dark history of the information age, in five extraordinary hacks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Allen Lane
2023
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 420 Seiten Illustrationen 24 cm |
ISBN: | 9780241461969 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049012565 | ||
003 | DE-604 | ||
005 | 20230810 | ||
007 | t | ||
008 | 230621s2023 a||| |||| 00||| eng d | ||
020 | |a 9780241461969 |9 978-0-241-46196-9 | ||
035 | |a (OCoLC)1389183137 | ||
035 | |a (DE-599)BVBBV049012565 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-210 |a DE-83 | ||
084 | |a SR 800 |0 (DE-625)143365: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Shapiro, Scott |e Verfasser |0 (DE-588)1027683754 |4 aut | |
245 | 1 | 0 | |a Fancy bear goes phishing |b the dark history of the information age, in five extraordinary hacks |c Scott J. Shapiro |
264 | 1 | |a London |b Allen Lane |c 2023 | |
300 | |a 420 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
648 | 7 | |a Geschichte |2 gnd |9 rswk-swf | |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Phishing |0 (DE-588)7515821-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Geschichte |A z |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Phishing |0 (DE-588)7515821-8 |D s |
689 | 4 | |5 DE-604 | |
689 | 5 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 5 | |5 DE-604 | |
689 | 6 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 6 | |5 DE-604 | |
689 | 7 | 0 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |D s |
689 | 7 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung Deutsches Museum |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034275590&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-034275590 |
Datensatz im Suchindex
_version_ | 1804185283828121600 |
---|---|
adam_text | CONTENTS
INTRODUCTION:
THE BRILLIANT
PROJECT
1. THE GREAT WORM
2.
HOW
THE
TORTOISE HACKED ACHILLES
3. THE
BULGARIAN
VIRUS
FACTORY
4. THE FATHER
OF
DRAGONS
5.
WINNER
TAKE
ALL
6. SNOOP DOGG DOES HIS LAUNDRY
7.
HOW
TO
MUDGE
8.
KILL
CHAIN
9.
THE MINECRAFT WARS
10.
ATTACK
OF
THE
KILLER TOASTERS
CONCLUSION:
THE DEATH
OF
SOLUTIONISM
EPILOGUE
NOTES
ACKNOWLEDGMENTS
INDEX
$IBIIOTHEK
DEUTSCHES
MUSEUM
HLUENCHE A
|
adam_txt |
CONTENTS
INTRODUCTION:
THE BRILLIANT
PROJECT
1. THE GREAT WORM
2.
HOW
THE
TORTOISE HACKED ACHILLES
3. THE
BULGARIAN
VIRUS
FACTORY
4. THE FATHER
OF
DRAGONS
5.
WINNER
TAKE
ALL
6. SNOOP DOGG DOES HIS LAUNDRY
7.
HOW
TO
MUDGE
8.
KILL
CHAIN
9.
THE MINECRAFT WARS
10.
ATTACK
OF
THE
KILLER TOASTERS
CONCLUSION:
THE DEATH
OF
SOLUTIONISM
EPILOGUE
NOTES
ACKNOWLEDGMENTS
INDEX
$IBIIOTHEK
DEUTSCHES
MUSEUM
HLUENCHE'A |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Shapiro, Scott |
author_GND | (DE-588)1027683754 |
author_facet | Shapiro, Scott |
author_role | aut |
author_sort | Shapiro, Scott |
author_variant | s s ss |
building | Verbundindex |
bvnumber | BV049012565 |
classification_rvk | SR 800 ST 277 |
ctrlnum | (OCoLC)1389183137 (DE-599)BVBBV049012565 |
discipline | Informatik |
discipline_str_mv | Informatik |
era | Geschichte gnd |
era_facet | Geschichte |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02373nam a2200601 c 4500</leader><controlfield tag="001">BV049012565</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230810 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230621s2023 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780241461969</subfield><subfield code="9">978-0-241-46196-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1389183137</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049012565</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-210</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 800</subfield><subfield code="0">(DE-625)143365:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shapiro, Scott</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1027683754</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fancy bear goes phishing</subfield><subfield code="b">the dark history of the information age, in five extraordinary hacks</subfield><subfield code="c">Scott J. Shapiro</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Allen Lane</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">420 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Geschichte</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="6" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="7" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="7" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung Deutsches Museum</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034275590&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034275590</subfield></datafield></record></collection> |
id | DE-604.BV049012565 |
illustrated | Illustrated |
index_date | 2024-07-03T22:12:04Z |
indexdate | 2024-07-10T09:52:47Z |
institution | BVB |
isbn | 9780241461969 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034275590 |
oclc_num | 1389183137 |
open_access_boolean | |
owner | DE-Aug4 DE-210 DE-83 |
owner_facet | DE-Aug4 DE-210 DE-83 |
physical | 420 Seiten Illustrationen 24 cm |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Allen Lane |
record_format | marc |
spelling | Shapiro, Scott Verfasser (DE-588)1027683754 aut Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks Scott J. Shapiro London Allen Lane 2023 420 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier Geschichte gnd rswk-swf Cyberattacke (DE-588)1075612675 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Informationsgesellschaft (DE-588)4114011-4 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Phishing (DE-588)7515821-8 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Geschichte z DE-604 Computerkriminalität (DE-588)4010452-7 s Hacker (DE-588)4113821-1 s Cyberattacke (DE-588)1075612675 s Phishing (DE-588)7515821-8 s Internet (DE-588)4308416-3 s Computersicherheit (DE-588)4274324-2 s Informationsgesellschaft (DE-588)4114011-4 s Digitalisierung Deutsches Museum application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034275590&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Shapiro, Scott Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks Cyberattacke (DE-588)1075612675 gnd Internet (DE-588)4308416-3 gnd Informationsgesellschaft (DE-588)4114011-4 gnd Internetkriminalität (DE-588)7864395-8 gnd Phishing (DE-588)7515821-8 gnd Computerkriminalität (DE-588)4010452-7 gnd Hacker (DE-588)4113821-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)1075612675 (DE-588)4308416-3 (DE-588)4114011-4 (DE-588)7864395-8 (DE-588)7515821-8 (DE-588)4010452-7 (DE-588)4113821-1 (DE-588)4274324-2 |
title | Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks |
title_auth | Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks |
title_exact_search | Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks |
title_exact_search_txtP | Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks |
title_full | Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks Scott J. Shapiro |
title_fullStr | Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks Scott J. Shapiro |
title_full_unstemmed | Fancy bear goes phishing the dark history of the information age, in five extraordinary hacks Scott J. Shapiro |
title_short | Fancy bear goes phishing |
title_sort | fancy bear goes phishing the dark history of the information age in five extraordinary hacks |
title_sub | the dark history of the information age, in five extraordinary hacks |
topic | Cyberattacke (DE-588)1075612675 gnd Internet (DE-588)4308416-3 gnd Informationsgesellschaft (DE-588)4114011-4 gnd Internetkriminalität (DE-588)7864395-8 gnd Phishing (DE-588)7515821-8 gnd Computerkriminalität (DE-588)4010452-7 gnd Hacker (DE-588)4113821-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Cyberattacke Internet Informationsgesellschaft Internetkriminalität Phishing Computerkriminalität Hacker Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034275590&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT shapiroscott fancybeargoesphishingthedarkhistoryoftheinformationageinfiveextraordinaryhacks |