The hacker and the state : (Registro n. 2125)

Detalhes MARC
000 -LEADER
fixed length control field 01671cam a2200289 i 4500
001 - CONTROL NUMBER
control field 21214867
003 - CONTROL NUMBER IDENTIFIER
control field BR-SpNIC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230601203523.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190904s2020 mau b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019033274
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780674987555
040 ## - CATALOGING SOURCE
Original cataloging agency MH/DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
-- BR-SpNIC
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Buchanan, Ben
Titles and words associated with a name (Writer on cybersecurity),
Relator term author.
245 14 - TITLE STATEMENT
Title The hacker and the state :
Remainder of title cyber attacks and the new normal of geopolitics
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cambridge, Massachusetts :
Name of producer, publisher, distributor, manufacturer Harvard University Press,
Date of production, publication, distribution, manufacture, or copyright notice [2020]
300 ## - PHYSICAL DESCRIPTION
Extent 412 p.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption.
520 ## - SUMMARY, ETC.
Summary, etc. "The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Segurança da informação na rede
9 (RLIN) 2258
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers
General subdivision Aspectos políticos
9 (RLIN) 510
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ciberterrorismo
9 (RLIN) 413
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ciberespaço
General subdivision Aspectos políticos
9 (RLIN) 1540
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Livro
Call number prefix 005.8
Call number suffix B919h
Exemplares
Date last seen Inventory number Total Checkouts Full call number Barcode Copy number Price effective from Koha item type Exemplar Extraviado Source of classification or shelving scheme Damaged status Not for loan Collection code Withdrawn status Home library Current library Date acquired
01/06/2023 2358060922   005.8 B919h 23589780674987555 EX.1 01/06/2023 Livro   Dewey Decimal Classification   Disponível Coleção Principal   Biblioteca NIC.br Biblioteca NIC.br 06/09/2022
Logo nic.br e cgi.br

Desenvolvido por

Logo acervos digitais