MARC details
000 -LEADER |
fixed length control field |
02291cam a2200301 i 4500 |
001 - CONTROL NUMBER |
control field |
19691388 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
UK-LoPHL |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20221111193146.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
ta |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180502s2017 xxu b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780300227444 |
Qualifying information |
hardcover : alk. paper |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0300227442 |
Qualifying information |
hardcover |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BTCTA |
Language of cataloging |
eng |
Transcribing agency |
BTCTA |
Description conventions |
rda |
Modifying agency |
BDX |
-- |
YDX |
-- |
DKC |
-- |
CNEDM |
-- |
VP@ |
-- |
GL4 |
-- |
HTM |
-- |
OCLCF |
-- |
A7U |
-- |
UCW |
-- |
IOJ |
-- |
TFW |
-- |
OCLCA |
-- |
JBG |
-- |
PAU |
-- |
RIU |
-- |
OCP |
-- |
GZM |
-- |
MCW |
-- |
K6U |
-- |
UPM |
-- |
LSH |
-- |
UMC |
-- |
NZAUC |
-- |
WTU |
-- |
CSAIL |
-- |
NDD |
-- |
IUL |
-- |
XFF |
-- |
MLY |
-- |
BCD |
-- |
INO |
-- |
COD |
-- |
ZLM |
-- |
DLC |
-- |
UK-LoPHL |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
364.168 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Landau, Susan Eva |
Relator term |
author. |
9 (RLIN) |
119160 |
245 10 - TITLE STATEMENT |
Title |
Listening in : |
Remainder of title |
cybersecurity in an insecure age / |
Statement of responsibility, etc. |
Susan Landau. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New Haven : |
Name of producer, publisher, distributor, manufacturer |
Yale University Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
2017. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 221 pages |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Source |
rdacarrier |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Racing into the digital revolution -- We're all connected now -- Dangers lurking within -- How do we protect ourselves? -- Investigations in the age of encryption -- There's no turning back. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age." |
Assigning source |
Dust jacket. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science) |
General subdivision |
Law and legislation. |
9 (RLIN) |
119162 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures |
-- |
Government policy. |
9 (RLIN) |
119163 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
9 (RLIN) |
119164 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |