NMC Library

Listening in : (Record no. 233175)

MARC details
000 -LEADER
fixed length control field 02715cam a2200373 i 4500
001 - CONTROL NUMBER
control field 2017944412
003 - CONTROL NUMBER IDENTIFIER
control field DLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190524125240.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170601s2017 xxk b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2017944412
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780300227444
Qualifying information (hardcover : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0300227442
Qualifying information (hardcover)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn982652181
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
040 ## - CATALOGING SOURCE
Original cataloging agency BTCTA
Language of cataloging eng
Description conventions rda
Transcribing agency BTCTA
Modifying agency BDX
-- YDX
-- DKC
-- CNEDM
-- VP@
-- GL4
-- HTM
-- OCLCF
-- A7U
-- UCW
-- IOJ
-- TFW
-- OCLCA
-- JBG
-- PAU
-- RIU
-- OCP
-- GZM
-- MCW
-- K6U
-- UPM
-- LSH
-- UMC
-- NZAUC
-- WTU
-- CSAIL
-- NDD
-- IUL
-- XFF
-- MLY
-- BCD
-- INO
-- COD
-- ZLM
-- DLC
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number K3264.C65
Item number L36 2017
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.16/8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Landau, Susan Eva,
245 10 - TITLE STATEMENT
Title Listening in :
Remainder of title cybersecurity in an insecure age /
Statement of responsibility, etc. Susan Landau.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New Haven :
Name of producer, publisher, distributor, manufacturer Yale University Press,
Date of production, publication, distribution, manufacture, or copyright notice [2017]
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 221 pages ;
Dimensions 22 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 173-207) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Racing into the digital revolution -- We're all connected now -- Dangers lurking within -- How do we protect ourselves? -- Investigations in the age of encryption -- There's no turning back.
520 ## - SUMMARY, ETC.
Summary, etc. "New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
General subdivision Law and legislation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Government policy.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Government policy.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872344
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872484
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
General subdivision Law and legislation.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00887937
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Koha item type
    Library of Congress Classification     Stacks 11/19/2018   K3264 .C65 L36 2017 33039001430742 07/20/2023 1 Book

Powered by Koha