NMC Library

Phishing for phools : (Record no. 31726)

MARC details
000 -LEADER
fixed length control field 01932cam a2200349 i 4500
001 - CONTROL NUMBER
control field 2015017179
003 - CONTROL NUMBER IDENTIFIER
control field DLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190729110202.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150803s2015 nju b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2015017179
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780691168319 (hbk. : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency DLC
-- MvI
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HB74.P8
Item number A49443 2015
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 330.01/9
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Akerlof, George A.,
Dates associated with a name 1940-
245 10 - TITLE STATEMENT
Title Phishing for phools :
Remainder of title the economics of manipulation and deception /
Statement of responsibility, etc. George A. Akerlof and Robert J. Shiller.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Princeton :
Name of producer, publisher, distributor, manufacturer Princeton University Press,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 272 pages ;
Dimensions 25 cm
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 233-256) and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Introduction. Expect to be manipulated: phishing equilibrium -- Part one: Unpaid bills and financial crash -- 1. Temptation strews our path -- 2. Reputation mining and financial crisis -- Part two: Phishing in many contexts -- 3. Advertisers discover how to zoom in on our weak spots -- 4. Rip-offs regarding cars, houses, and credit cards -- 5. Phishing in politics -- 6. Phood, pharma, and phishing -- 7. Innovation: the good, the bad, and the ugly -- 8. Tobacco and alcohol -- 9. Bankruptcy for profit -- 10. Michael Milken phishes with junk bonds as bait -- 11. The resistance and its heroes -- Part three: Conclusion and afterword -- Conclusion: examples and general lessons. New story in America and its consequences -- Afterword. The significance of phishing equilibrium.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Economics
General subdivision Psychological aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Free enterprise
General subdivision Psychological aspects.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Shiller, Robert J.,
948 ## - LOCAL PROCESSING INFORMATION (OCLC); SERIES PART DESIGNATOR (RLIN)
Series part designator, SPT (RLIN) u596290
949 ## - LOCAL PROCESSING INFORMATION (OCLC)
a HB74 .P8 A49443 2015
w LC
c 1
h EY8Z
i 33039001357283
903 ## - LOCAL DATA ELEMENT C, LDC (RLIN)
a 31726
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Koha item type
    Library of Congress Classification     Stacks 06/19/2018   HB74 .P8 A49443 2015 33039001357283 06/26/2023 1 Book

Powered by Koha