The language of cyber attacks: a rhetoric of deception
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; New York ; Oxford ; New Delhi ; Sydney
Bloomsbury Academic
2024
|
Schriftenreihe: | Bloomsbury studies in digital cultures
Vol 6 |
Schlagworte: | |
Beschreibung: | x, 224 Seiten Diagramm |
ISBN: | 9781350354678 9781350354685 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV049896144 | ||
003 | DE-604 | ||
005 | 20241204 | ||
007 | t| | ||
008 | 241008s2024 xx |||| |||| 00||| eng d | ||
020 | |a 9781350354678 |c pbk. |9 978-1-350-35467-8 | ||
020 | |a 9781350354685 |c hbk. |9 978-1-350-35468-5 | ||
035 | |a (OCoLC)1472954469 | ||
035 | |a (DE-599)BVBBV049896144 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-29T |a DE-188 | ||
084 | |a AP 15944 |0 (DE-625)6957: |2 rvk | ||
100 | 1 | |a Mauro, Aaron |e Verfasser |0 (DE-588)131683168X |4 aut | |
245 | 1 | 0 | |a The language of cyber attacks |b a rhetoric of deception |c Aaron Mauro |
264 | 1 | |a London ; New York ; Oxford ; New Delhi ; Sydney |b Bloomsbury Academic |c 2024 | |
300 | |a x, 224 Seiten |b Diagramm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Bloomsbury studies in digital cultures |v Vol 6 | |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rhetorik |0 (DE-588)4076704-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerlinguistik |0 (DE-588)4035843-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Computerlinguistik |0 (DE-588)4035843-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 1 | 1 | |a Rhetorik |0 (DE-588)4076704-8 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-188 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 978-1-3503-5469-2 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-3503-5470-8 |
830 | 0 | |a Bloomsbury studies in digital cultures |v Vol 6 |w (DE-604)BV049965715 |9 6 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035235194 |
Datensatz im Suchindex
_version_ | 1822482905158385664 |
---|---|
adam_text | |
any_adam_object | |
author | Mauro, Aaron |
author_GND | (DE-588)131683168X |
author_facet | Mauro, Aaron |
author_role | aut |
author_sort | Mauro, Aaron |
author_variant | a m am |
building | Verbundindex |
bvnumber | BV049896144 |
classification_rvk | AP 15944 |
ctrlnum | (OCoLC)1472954469 (DE-599)BVBBV049896144 |
discipline | Allgemeines |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV049896144</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241204</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241008s2024 xx |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781350354678</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-350-35467-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781350354685</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-350-35468-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1472954469</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049896144</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 15944</subfield><subfield code="0">(DE-625)6957:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mauro, Aaron</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)131683168X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The language of cyber attacks</subfield><subfield code="b">a rhetoric of deception</subfield><subfield code="c">Aaron Mauro</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York ; Oxford ; New Delhi ; Sydney</subfield><subfield code="b">Bloomsbury Academic</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 224 Seiten</subfield><subfield code="b">Diagramm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Bloomsbury studies in digital cultures</subfield><subfield code="v">Vol 6</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rhetorik</subfield><subfield code="0">(DE-588)4076704-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerlinguistik</subfield><subfield code="0">(DE-588)4035843-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerlinguistik</subfield><subfield code="0">(DE-588)4035843-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Rhetorik</subfield><subfield code="0">(DE-588)4076704-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-1-3503-5469-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-3503-5470-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Bloomsbury studies in digital cultures</subfield><subfield code="v">Vol 6</subfield><subfield code="w">(DE-604)BV049965715</subfield><subfield code="9">6</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035235194</subfield></datafield></record></collection> |
id | DE-604.BV049896144 |
illustrated | Not Illustrated |
indexdate | 2025-01-28T09:05:38Z |
institution | BVB |
isbn | 9781350354678 9781350354685 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035235194 |
oclc_num | 1472954469 |
open_access_boolean | |
owner | DE-706 DE-29T DE-188 |
owner_facet | DE-706 DE-29T DE-188 |
physical | x, 224 Seiten Diagramm |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Bloomsbury Academic |
record_format | marc |
series | Bloomsbury studies in digital cultures |
series2 | Bloomsbury studies in digital cultures |
spelling | Mauro, Aaron Verfasser (DE-588)131683168X aut The language of cyber attacks a rhetoric of deception Aaron Mauro London ; New York ; Oxford ; New Delhi ; Sydney Bloomsbury Academic 2024 x, 224 Seiten Diagramm txt rdacontent n rdamedia nc rdacarrier Bloomsbury studies in digital cultures Vol 6 Cyberattacke (DE-588)1075612675 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rhetorik (DE-588)4076704-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computerlinguistik (DE-588)4035843-4 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Computerlinguistik (DE-588)4035843-4 s DE-604 Cyberattacke (DE-588)1075612675 s Rhetorik (DE-588)4076704-8 s Computersicherheit (DE-588)4274324-2 s DE-188 Erscheint auch als Online-Ausgabe, PDF 978-1-3503-5469-2 Erscheint auch als Online-Ausgabe 978-1-3503-5470-8 Bloomsbury studies in digital cultures Vol 6 (DE-604)BV049965715 6 |
spellingShingle | Mauro, Aaron The language of cyber attacks a rhetoric of deception Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd Rhetorik (DE-588)4076704-8 gnd Internetkriminalität (DE-588)7864395-8 gnd Computerlinguistik (DE-588)4035843-4 gnd Bloomsbury studies in digital cultures |
subject_GND | (DE-588)1075612675 (DE-588)4274324-2 (DE-588)4076704-8 (DE-588)7864395-8 (DE-588)4035843-4 |
title | The language of cyber attacks a rhetoric of deception |
title_auth | The language of cyber attacks a rhetoric of deception |
title_exact_search | The language of cyber attacks a rhetoric of deception |
title_full | The language of cyber attacks a rhetoric of deception Aaron Mauro |
title_fullStr | The language of cyber attacks a rhetoric of deception Aaron Mauro |
title_full_unstemmed | The language of cyber attacks a rhetoric of deception Aaron Mauro |
title_short | The language of cyber attacks |
title_sort | the language of cyber attacks a rhetoric of deception |
title_sub | a rhetoric of deception |
topic | Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd Rhetorik (DE-588)4076704-8 gnd Internetkriminalität (DE-588)7864395-8 gnd Computerlinguistik (DE-588)4035843-4 gnd |
topic_facet | Cyberattacke Computersicherheit Rhetorik Internetkriminalität Computerlinguistik |
volume_link | (DE-604)BV049965715 |
work_keys_str_mv | AT mauroaaron thelanguageofcyberattacksarhetoricofdeception |