How to hack a human : (Record no. 291271)

MARC details
000 -LEADER
fixed length control field 01684cam a2200313Ki 4500
001 - CONTROL NUMBER
control field on1031455389
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190415085612.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180419s2019 enk 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Transcribing agency YDX
Modifying agency OCLCQ
-- NFG
019 ## -
-- 1031664953
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1911452231
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781911452232
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1031455389
Canceled/invalid control number (OCoLC)1031664953
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Classification number 658.478
Item number M495
049 ## - LOCAL HOLDINGS (OCLC)
Holding library NFGA
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Meeuwisse, Marina.
9 (RLIN) 395048
245 10 - TITLE STATEMENT
Title How to hack a human :
Remainder of title cybersecurity for the mind /
Statement of responsibility, etc Dr. Marina Meeuwisse.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc London :
Name of publisher, distributor, etc Cyber Simplicity, Ltd. ;
Date of publication, distribution, etc 2018.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 214 pages ;
Dimensions 23 cm
336 ## - CONTENT TYPE
Content Type Term text
Content Type Code txt
Source rdacontent
337 ## - MEDIA TYPE
Media Type Term unmediated
Media Type Code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier Type Term volume
Carrier Type Code nc
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc Do you worry about cyber criminals hacking your computers and other digital devices? You should. Connect a new computer to the Internet and the average time before there is a hacking attempt is less than a minute. But you may not be aware that hacking the human mind is far easier than hacking any computer system - if you know how to do it. What's even scarier is that both criminals and legitimate organizations engage in human hacking. As a cybersecurity professional, I began exploring how cybersecurity techniques can be used against hackers of humans, and I wrote this book to equip you - and millions of others being targeted every day - with a guide that helps you understand how these hackers operate and how you can defend yourself against them.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking.
9 (RLIN) 395049
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
9 (RLIN) 132125
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
9 (RLIN) 195871
994 ## -
-- C0
-- NFG
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Cost, replacement price Price effective from Koha item type
        NonFiction Main Library Main Library 04/04/2019 1 5 4 658.478 M495 33111009142221 05/01/2024 12/13/2023 14.99 03/29/2019 Adult Book

Powered by Koha