008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field
200218s2017 enk g 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number
9781849045544
Terms of availability
RM180.00
Qualifying information
hardback
040 ## - CATALOGING SOURCE
Original cataloging agency
PPAK
Language of cataloging
eng
Transcribing agency
PPAK
Description conventions
rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number
23
Classification number
363.325
090 00 - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR)
363.325
Feature heading
GUI
Feature heading
R
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name
Guitton, Clement.,
Relator term
author.
245 10 - TITLE STATEMENT
Title
Inside the Enemy's Computer :
Remainder of title
Identifying Cyber Attackers /
Statement of responsibility, etc.
CLEMENT GUITTON
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture
London :
Name of producer, publisher, distributor, manufacturer
C. Hurst & Co. (Publishers) Ltd.,
Date of production, publication, distribution, manufacture, or copyright notice
2017
300 ## - PHYSICAL DESCRIPTION
Extent
x, 304 pages :
Dimensions
22 cm
336 ## - CONTENT TYPE
Source
rdacontent
Content type term
text
337 ## - MEDIA TYPE
Source
rdamedia
Media type term
unmediated
338 ## - CARRIER TYPE
Source
rdacarrier
Carrier type term
volume
500 ## - GENERAL NOTE
General note
Includes index
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note
Bibliography pages : 255-289
520 ## - SUMMARY, ETC.
Summary, etc.
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
Cyberterrorism
Form subdivision
Prevention
Topical term or geographic name entry element
Cyberattacke
Topical term or geographic name entry element
Hackers
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Dewey Decimal Classification
Koha item type
Book
Holdings
Withdrawn
Not for loan
Current library
Shelving location
Date acquired
Full call number
Barcode
Date last seen
Koha item type
Not For Loan
Perpustakaan Alor Setar
Rujukan Dewasa
15/03/2020
R 363.325 GUI
A01635130
15/03/2020
Book
Inside the Enemy's Computer :
APA
Guitton C., . (2017). Inside the Enemy's Computer. London: C. Hurst & Co. (Publishers) Ltd.
Chicago
Guitton Clement, . 2017. Inside the Enemy's Computer. London: C. Hurst & Co. (Publishers) Ltd.
Harvard
Guitton C., . (2017). Inside the Enemy's Computer. London: C. Hurst & Co. (Publishers) Ltd.
MLA
Guitton Clement, . Inside the Enemy's Computer. London: C. Hurst & Co. (Publishers) Ltd. 2017.