MARC details
000 -LEADER |
fixed length control field |
02588cam a2200397Ii 4500 |
001 - CONTROL NUMBER |
control field |
on1159536088 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210429141721.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200625s2020 caua 001 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
YDX |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
YDX |
Modifying agency |
BDX |
-- |
AU@ |
-- |
ZHK |
-- |
OCLCO |
-- |
OCLCF |
-- |
NFG |
019 ## - |
-- |
1200259734 |
-- |
1202267365 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1681886545 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781681886541 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1159536088 |
Canceled/invalid control number |
(OCoLC)1200259734 |
-- |
(OCoLC)1202267365 |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) |
Classification number |
005.8 |
Item number |
S464 |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
NFGA |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Selby, Nick |
Titles and other words associated with a name |
(Police detective), |
Relator term |
author. |
245 14 - TITLE STATEMENT |
Title |
The cyber attack survival manual : |
Remainder of title |
tools for surviving everything from identity theft to the digital apocalypse / |
Statement of responsibility, etc |
Nick Selby, Heather Vescent ; illustrations by Eric Chow and Conor Buckley. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS |
Place of production, publication, distribution, manufacture |
Richmond, California : |
Name of producer, publisher, distributor, manufacturer |
Weldon Owen International, |
Date of production, publication, distribution, manufacture |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
221 pages : |
Other physical details |
color illustrations ; |
Dimensions |
22 cm. |
336 ## - CONTENT TYPE |
Content Type Term |
text |
Content Type Code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media Type Term |
unmediated |
Media Type Code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier Type Term |
volume |
Carrier Type Code |
nc |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
This book is already out of date (and that's okay) -- Also, this book will freak you out (that's okay too) -- Hack your life -- Keep your identity safe -- Where the money is -- Protect your privacy online -- Keep kids safe online -- The internet of things -- Not just phoning it in -- Hack society -- Cyber security and small business -- The future of money -- Degrees of deception -- Sex and love in the cyber age -- Internet vigilantes and mob rules -- Hack the world -- The deep dark net -- Wikileaks and whistleblowers -- International cybersecurity. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at any time, targeting you through a laptop, a smartphone, a television -- even your doorbell or thermostat. The good news? You don't have to be a victim. In this comprehensive, practical, and fact-filled book, global security expert Nick Selby and futurist Heather Vescent give you the tools you need to protect your family, your privacy, your finances, and your reputation. Don't go online without it." -- Back cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Prevention. |
9 (RLIN) |
195871 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
65877 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Identity theft. |
9 (RLIN) |
155053 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cyberterrorism. |
9 (RLIN) |
111599 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
9 (RLIN) |
132125 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Vescent, Heather, |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Chow, Eric, |
Relator term |
illustrator. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Buckley, Conor, |
Relator term |
illustrator. |
994 ## - |
-- |
C0 |
-- |
NFG |