The audacity to spy :: how government, business, and hackers rob us of privacy /
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Basking Ridge, NJ :
Technics Publications,
2014.
|
Ausgabe: | 1st ed. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Annotation |
Beschreibung: | 1 online resource (1 volume) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781634620604 1634620607 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn891187365 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 140924s2014 njua ob 000 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d DEBBG |d DEBSZ |d S4S |d COO |d N$T |d OCLCF |d YDXCP |d OCLCQ |d ICA |d AGLDB |d OCLCQ |d REB |d VTS |d CEF |d WYU |d STF |d AU@ |d M8D |d OCLCQ |d K6U |d VLY |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1162030854 |a 1241943173 |a 1300495838 |a 1303321556 |a 1303479061 | ||
020 | |a 9781634620604 |q (electronic bk.) | ||
020 | |a 1634620607 |q (electronic bk.) | ||
020 | |z 9781935504818 | ||
020 | |z 1935504819 | ||
020 | |z 1935504797 | ||
020 | |z 9781935504795 | ||
035 | |a (OCoLC)891187365 |z (OCoLC)1162030854 |z (OCoLC)1241943173 |z (OCoLC)1300495838 |z (OCoLC)1303321556 |z (OCoLC)1303479061 | ||
037 | |a CL0500000478 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 |b .N653 2014 | |
072 | 7 | |a POL |x 004000 |2 bisacsh | |
072 | 7 | |a POL |x 035010 |2 bisacsh | |
082 | 7 | |a 323.448 | |
049 | |a MAIN | ||
100 | 1 | |a Nolan, Catherine. |0 http://id.loc.gov/authorities/names/no92023477 | |
245 | 1 | 4 | |a The audacity to spy : |b how government, business, and hackers rob us of privacy / |c Catherine Nolan, Ashley M. Wilson. |
246 | 3 | 0 | |a How government, business, and hackers rob us of privacy |
250 | |a 1st ed. | ||
260 | |a Basking Ridge, NJ : |b Technics Publications, |c 2014. | ||
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed September 17, 2014). | |
504 | |a Includes bibliographical references. | ||
520 | 8 | |a Annotation |b The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. | |
546 | |a English. | ||
650 | 0 | |a Computers |x Access control. |0 http://id.loc.gov/authorities/subjects/sh85029553 | |
650 | 0 | |a Hacking. |0 http://id.loc.gov/authorities/subjects/sh2013002597 | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle. | |
650 | 6 | |a Piratage informatique. | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Civil Rights. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Human Rights. |2 bisacsh | |
650 | 7 | |a Computers |x Access control |2 fast | |
650 | 7 | |a Hacking |2 fast | |
700 | 1 | |a Wilson, Ashley M. | |
758 | |i has work: |a The audacity to spy (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGFTJjWqcvkPgYYrPP444q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | |z 1935504797 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1005061 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1005061 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1005061 | ||
938 | |a YBP Library Services |b YANK |n 12478197 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn891187365 |
---|---|
_version_ | 1826942059406163968 |
adam_text | |
any_adam_object | |
author | Nolan, Catherine |
author2 | Wilson, Ashley M. |
author2_role | |
author2_variant | a m w am amw |
author_GND | http://id.loc.gov/authorities/names/no92023477 |
author_facet | Nolan, Catherine Wilson, Ashley M. |
author_role | |
author_sort | Nolan, Catherine |
author_variant | c n cn |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 .N653 2014 |
callnumber-search | QA76.9.A25 .N653 2014 |
callnumber-sort | QA 276.9 A25 N653 42014 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)891187365 |
dewey-full | 323.448 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 323 - Civil and political rights |
dewey-raw | 323.448 |
dewey-search | 323.448 |
dewey-sort | 3323.448 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
edition | 1st ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02983cam a2200613 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn891187365</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">140924s2014 njua ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">DEBBG</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">S4S</subfield><subfield code="d">COO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">REB</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">AU@</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1162030854</subfield><subfield code="a">1241943173</subfield><subfield code="a">1300495838</subfield><subfield code="a">1303321556</subfield><subfield code="a">1303479061</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781634620604</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1634620607</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781935504818</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1935504819</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1935504797</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781935504795</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)891187365</subfield><subfield code="z">(OCoLC)1162030854</subfield><subfield code="z">(OCoLC)1241943173</subfield><subfield code="z">(OCoLC)1300495838</subfield><subfield code="z">(OCoLC)1303321556</subfield><subfield code="z">(OCoLC)1303479061</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000478</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.N653 2014</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">035010</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">323.448</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nolan, Catherine.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no92023477</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The audacity to spy :</subfield><subfield code="b">how government, business, and hackers rob us of privacy /</subfield><subfield code="c">Catherine Nolan, Ashley M. Wilson.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">How government, business, and hackers rob us of privacy</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basking Ridge, NJ :</subfield><subfield code="b">Technics Publications,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed September 17, 2014).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029553</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013002597</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Piratage informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">Civil Rights.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">Human Rights.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hacking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wilson, Ashley M.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The audacity to spy (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGFTJjWqcvkPgYYrPP444q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">1935504797</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1005061</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1005061</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1005061</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12478197</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn891187365 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:21:59Z |
institution | BVB |
isbn | 9781634620604 1634620607 |
language | English |
oclc_num | 891187365 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Technics Publications, |
record_format | marc |
spelling | Nolan, Catherine. http://id.loc.gov/authorities/names/no92023477 The audacity to spy : how government, business, and hackers rob us of privacy / Catherine Nolan, Ashley M. Wilson. How government, business, and hackers rob us of privacy 1st ed. Basking Ridge, NJ : Technics Publications, 2014. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from title page (Safari, viewed September 17, 2014). Includes bibliographical references. Annotation The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. English. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Ordinateurs Accès Contrôle. Piratage informatique. POLITICAL SCIENCE Political Freedom & Security Civil Rights. bisacsh POLITICAL SCIENCE Political Freedom & Security Human Rights. bisacsh Computers Access control fast Hacking fast Wilson, Ashley M. has work: The audacity to spy (Text) https://id.oclc.org/worldcat/entity/E39PCGFTJjWqcvkPgYYrPP444q https://id.oclc.org/worldcat/ontology/hasWork 1935504797 |
spellingShingle | Nolan, Catherine The audacity to spy : how government, business, and hackers rob us of privacy / Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Ordinateurs Accès Contrôle. Piratage informatique. POLITICAL SCIENCE Political Freedom & Security Civil Rights. bisacsh POLITICAL SCIENCE Political Freedom & Security Human Rights. bisacsh Computers Access control fast Hacking fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029553 http://id.loc.gov/authorities/subjects/sh2013002597 |
title | The audacity to spy : how government, business, and hackers rob us of privacy / |
title_alt | How government, business, and hackers rob us of privacy |
title_auth | The audacity to spy : how government, business, and hackers rob us of privacy / |
title_exact_search | The audacity to spy : how government, business, and hackers rob us of privacy / |
title_full | The audacity to spy : how government, business, and hackers rob us of privacy / Catherine Nolan, Ashley M. Wilson. |
title_fullStr | The audacity to spy : how government, business, and hackers rob us of privacy / Catherine Nolan, Ashley M. Wilson. |
title_full_unstemmed | The audacity to spy : how government, business, and hackers rob us of privacy / Catherine Nolan, Ashley M. Wilson. |
title_short | The audacity to spy : |
title_sort | audacity to spy how government business and hackers rob us of privacy |
title_sub | how government, business, and hackers rob us of privacy / |
topic | Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Ordinateurs Accès Contrôle. Piratage informatique. POLITICAL SCIENCE Political Freedom & Security Civil Rights. bisacsh POLITICAL SCIENCE Political Freedom & Security Human Rights. bisacsh Computers Access control fast Hacking fast |
topic_facet | Computers Access control. Hacking. Ordinateurs Accès Contrôle. Piratage informatique. POLITICAL SCIENCE Political Freedom & Security Civil Rights. POLITICAL SCIENCE Political Freedom & Security Human Rights. Computers Access control Hacking |
work_keys_str_mv | AT nolancatherine theaudacitytospyhowgovernmentbusinessandhackersrobusofprivacy AT wilsonashleym theaudacitytospyhowgovernmentbusinessandhackersrobusofprivacy AT nolancatherine howgovernmentbusinessandhackersrobusofprivacy AT wilsonashleym howgovernmentbusinessandhackersrobusofprivacy AT nolancatherine audacitytospyhowgovernmentbusinessandhackersrobusofprivacy AT wilsonashleym audacitytospyhowgovernmentbusinessandhackersrobusofprivacy |