MARC details
000 -LEADER |
fixed length control field |
03406cam a2200457 i 4500 |
001 - CONTROL NUMBER |
control field |
on1345214941 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230620093208.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
221202t20232023nyua e b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2022057852 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
Modifying agency |
OCLCF |
-- |
GK8 |
-- |
OI6 |
-- |
CLE |
-- |
IMT |
-- |
UAP |
-- |
UKMGB |
-- |
RNL |
-- |
GK8 |
-- |
OCLCA |
-- |
OCP |
-- |
YDX |
-- |
NFG |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBC395831 |
Source |
bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
021060431 |
Source |
Uk |
019 ## - |
-- |
1381127160 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780374601171 |
Qualifying information |
hardcover |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0374601178 |
Qualifying information |
hardcover |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1345214941 |
Canceled/invalid control number |
(OCoLC)1381127160 |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) |
Classification number |
364.168 |
Item number |
S529 |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
NFGA |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Shapiro, Scott J., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Fancy Bear goes phishing : |
Remainder of title |
the dark history of the information age, in five extraordinary hacks / |
Statement of responsibility, etc |
Scott J. Shapiro. |
246 3# - VARYING FORM OF TITLE |
Title proper/short title |
Dark history of the information age, in 5 extraordinary hacks. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS |
Place of production, publication, distribution, manufacture |
New York : |
Name of producer, publisher, distributor, manufacturer |
Farrar, Straus and Giroux, |
Date of production, publication, distribution, manufacture |
2023. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS |
Date of production, publication, distribution, manufacture |
©2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
420 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content Type Term |
text |
Content Type Code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media Type Term |
unmediated |
Media Type Code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier Type Term |
volume |
Carrier Type Code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (pages 331-402) and index. |
505 00 - FORMATTED CONTENTS NOTE |
Title |
Introduction: The Brilliant Project -- |
-- |
The great worm -- |
-- |
How the tortoise hacked Achilles -- |
-- |
The Bulgarian virus factory -- |
-- |
The father of dragons -- |
-- |
Winner take all -- |
-- |
Snoop Dogg does his laundry -- |
-- |
How to mudge -- |
-- |
Kill chain -- |
-- |
The Minecraft wars -- |
-- |
Attack of the killer toasters -- |
-- |
Conclusion: The death of solutionism -- |
-- |
Epilogue. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"-- |
Assigning source |
Provided by publisher. |
520 ## - SUMMARY, ETC. |
Summary, etc |
It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian "Dark Avenger," who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Hacking |
Form subdivision |
Case studies. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Phishing |
Form subdivision |
Case studies. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet |
General subdivision |
Security measures. |
9 (RLIN) |
164033 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet in espionage. |
9 (RLIN) |
355085 |
655 #7 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Case studies. |
Source of term |
lcgft |
9 (RLIN) |
266460 |
994 ## - |
-- |
C0 |
-- |
NFG |