Inside the Enemy's Computer : (Record no. 176456)

MARC details
000 -LEADER
fixed length control field 01053nam a22002897i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200218123931.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200218s2017 enk g 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781849045544
Terms of availability RM180.00
Qualifying information hardback
040 ## - CATALOGING SOURCE
Original cataloging agency PPAK
Language of cataloging eng
Transcribing agency PPAK
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 363.325
090 00 - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) 363.325
Feature heading GUI
Feature heading R
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Guitton, Clement.,
Relator term author.
245 10 - TITLE STATEMENT
Title Inside the Enemy's Computer :
Remainder of title Identifying Cyber Attackers /
Statement of responsibility, etc. CLEMENT GUITTON
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London :
Name of producer, publisher, distributor, manufacturer C. Hurst & Co. (Publishers) Ltd.,
Date of production, publication, distribution, manufacture, or copyright notice 2017
300 ## - PHYSICAL DESCRIPTION
Extent x, 304 pages :
Dimensions 22 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note Includes index
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Bibliography pages : 255-289
520 ## - SUMMARY, ETC.
Summary, etc. When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
Form subdivision Prevention
Topical term or geographic name entry element Cyberattacke
Topical term or geographic name entry element Hackers
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn Not for loan Current library Shelving location Date acquired Full call number Barcode Date last seen Koha item type
  Not For Loan Perpustakaan Alor Setar Rujukan Dewasa 15/03/2020 R 363.325 GUI A01635130 15/03/2020 Book