000 -LEADER |
fixed length control field |
01186cam a2200361 a 4500 |
CONTROL NUMBER |
control field |
17264782 |
CONTROL NUMBER IDENTIFIER |
control field |
DLC |
DATE AND TIME OF LATEST TRANSACTION |
control field |
20120912153207.0 |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
120420s2013 caua d b 001 0 eng |
LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2012014159 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781601522689 (lib. bdg.) |
SOURCE OF ACQUISITION |
Source of stock number/acquisition |
Knowbuddy Resources |
CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
AUTHENTICATION CODE |
Authentication code |
pcc |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
364.16/8 |
Edition number |
23 |
LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) |
Classification number |
364.168 COV |
AUTHOR NAME |
AUTHOR NAME |
Covaleski, John. |
TITLE STATEMENT |
Title |
Hacking / |
Statement of responsibility, etc |
John Covaleski. |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
San Diego, Calif. : |
Name of publisher, distributor, etc |
ReferencePoint, |
Date of publication, distribution, etc |
2013. |
PHYSICAL DESCRIPTION |
Extent |
96 p. : |
Other physical details |
col. ill. ; |
Dimensions |
25 cm. |
SERIES STATEMENT |
Series statement |
Compact research |
SERIES STATEMENT |
Series statement |
The Internet |
BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
FORMATTED CONTENTS NOTE |
Formatted contents note |
Hacking at a glance -- How serious is the threat from hacking? -- Does hacking threaten national security? -- Is hacking justifiable? -- Can hackers be stopped? |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer hackers. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |