MARC details
000 -LEADER |
fixed length control field |
02768cam a2200397 i 4500 |
001 - CONTROL NUMBER |
control field |
ocn951711109 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20180722224152.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
160527t20172017nyua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2016024302 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
Modifying agency |
YDXCP |
-- |
BTCTA |
-- |
BDX |
-- |
OCLCO |
-- |
OCLCF |
-- |
OCLCO |
-- |
SFR |
-- |
ON8 |
-- |
FM0 |
-- |
YDX |
-- |
OCLCO |
-- |
BUR |
-- |
ZHB |
-- |
TYPML |
-- |
IGA |
-- |
OCLCA |
-- |
NFG |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780316380508 |
Qualifying information |
hardcover |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0316380504 |
Qualifying information |
hardcover |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)951711109 |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) |
Classification number |
005.8 |
Item number |
M684 |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
NFGA |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Mitnick, Kevin D. |
Fuller form of name |
(Kevin David), |
Dates associated with a name |
1963- |
Relator term |
author. |
9 (RLIN) |
184956 |
245 14 - TITLE STATEMENT |
Title |
The art of invisibility : |
Remainder of title |
the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / |
Statement of responsibility, etc |
Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS |
Place of production, publication, distribution, manufacture |
New York : |
Name of producer, publisher, distributor, manufacturer |
Little, Brown and Company, |
Date of production, publication, distribution, manufacture |
2017. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS |
Date of production, publication, distribution, manufacture |
©2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
x, 309 pages : |
Other physical details |
illustration ; |
Dimensions |
25 cm |
336 ## - CONTENT TYPE |
Content Type Term |
text |
Content Type Code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media Type Term |
unmediated |
Media Type Code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier Type Term |
volume |
Carrier Type Code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (pages 283-298) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Time to disappear -- Your password can be cracked! -- Who else is reading your e-mail? -- Wiretapping 101 -- If you don't encrypt, you're unequipped -- Now you see me, now you don't -- Every mouse click you make, I'll be watching you -- Pay up or else! -- Believe everything, trust nothing -- You have no privacy? Get over it! -- You can run but not hide -- Hey, KITT, don't share my location -- The internet of surveillance -- Things your boss doesn't want you to know -- Obtaining anonymity is hard work -- The FBI always gets its man -- Mastering the art of invisibility. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening."--Dust jacket. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet |
General subdivision |
Security measures. |
9 (RLIN) |
164033 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
65877 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
9 (RLIN) |
132125 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Privacy, Right of. |
9 (RLIN) |
202079 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Vamosi, Robert, |
Relator term |
author. |
9 (RLIN) |
327121 |
994 ## - |
-- |
C0 |
-- |
NFG |