Record ID | ia:informationwarfa0000schw |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/informationwarfa0000schw/informationwarfa0000schw_marc.xml |
Download MARC binary | https://www.archive.org/download/informationwarfa0000schw/informationwarfa0000schw_meta.mrc |
LEADER: 02087cam 2200589 a 4500
001 ocm36067063
003 OCoLC
005 20180717134227.0
008 981201s1996 nyu b 001 0 eng
010 $a 98214479
040 $aDLC$beng$cDLC$dBAKER$dNLGGC$dBTCTA$dYDXCP$dDEBSZ$dGEBAY$dOCLCO$dOCLCF$dUKMGB$dOCLCQ$dOCLCA
016 7 $a007135056$2Uk
019 $a1011960876$a1029391571
020 $a1560251328
020 $a9781560251323
024 3 $a9781560251323
035 $a(OCoLC)36067063$z(OCoLC)1011960876$z(OCoLC)1029391571
050 0 $aQA76.9.A25S354 1996
082 00 $a302.2$221
084 $a54.32$2bcl
100 1 $aSchwartau, Winn.
245 10 $aInformation warfare :$bcyberterrorism--protecting your personal security in the electronic age /$cWinn Schwartau.
250 $a2nd trade pbk. ed.
260 $aNew York :$bThunder's Mouth Press ;$aEmeryville, CA :$bDistributed by Publishers Group West,$c1996.
300 $a768 pages ;$c23 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references (pages 746-752) and index.
650 0 $aComputer security.
650 0 $aComputer crimes.
650 7 $aComputer crimes.$2fast$0(OCoLC)fst00872063
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 17 $aCriminaliteit.$2gtt
650 17 $aBeveiliging.$2gtt
650 17 $aComputernetwerken.$2gtt
650 17 $aComputers.$2gtt
650 07 $aInformation warfare.$2swd
650 07 $aComputerkriminalita t.$2swd
650 07 $aDatenschutz.$2swd
938 $aBaker & Taylor$bBKTY$c18.95$d14.21$i1560251328$n0002606823$sactive
938 $aBaker and Taylor$bBTCP$n98214479
938 $aYBP Library Services$bYANK$n1287655
029 1 $aAU@$b000013201050
029 1 $aAU@$b000021743938
029 1 $aGEBAY$b6158939
029 1 $aHR0$bG05703216
029 1 $aNLGGC$b16916621X
029 1 $aNZ1$b2462514
029 1 $aDEBSZ$b107381052
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 218 OTHER HOLDINGS