Detalhes MARC
000 -LEADER |
fixed length control field |
01671cam a2200289 i 4500 |
001 - CONTROL NUMBER |
control field |
21214867 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
BR-SpNIC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230601203523.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190904s2020 mau b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2019033274 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780674987555 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
MH/DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
-- |
BR-SpNIC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Buchanan, Ben |
Titles and words associated with a name |
(Writer on cybersecurity), |
Relator term |
author. |
245 14 - TITLE STATEMENT |
Title |
The hacker and the state : |
Remainder of title |
cyber attacks and the new normal of geopolitics |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cambridge, Massachusetts : |
Name of producer, publisher, distributor, manufacturer |
Harvard University Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2020] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
412 p. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Segurança da informação na rede |
9 (RLIN) |
2258 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hackers |
General subdivision |
Aspectos políticos |
9 (RLIN) |
510 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ciberterrorismo |
9 (RLIN) |
413 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ciberespaço |
General subdivision |
Aspectos políticos |
9 (RLIN) |
1540 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Livro |
Call number prefix |
005.8 |
Call number suffix |
B919h |