|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn891187365 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140924s2014 njua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d DEBBG
|d DEBSZ
|d S4S
|d COO
|d N$T
|d OCLCF
|d YDXCP
|d OCLCQ
|d ICA
|d AGLDB
|d OCLCQ
|d REB
|d VTS
|d CEF
|d WYU
|d STF
|d AU@
|d M8D
|d OCLCQ
|d K6U
|d VLY
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1162030854
|a 1241943173
|a 1300495838
|a 1303321556
|a 1303479061
|
020 |
|
|
|a 9781634620604
|q (electronic bk.)
|
020 |
|
|
|a 1634620607
|q (electronic bk.)
|
020 |
|
|
|z 9781935504818
|
020 |
|
|
|z 1935504819
|
020 |
|
|
|z 1935504797
|
020 |
|
|
|z 9781935504795
|
029 |
1 |
|
|a DEBBG
|b BV042182624
|
029 |
1 |
|
|a DEBSZ
|b 417233116
|
029 |
1 |
|
|a DEBSZ
|b 481285474
|
029 |
1 |
|
|a GBVCP
|b 80497215X
|
035 |
|
|
|a (OCoLC)891187365
|z (OCoLC)1162030854
|z (OCoLC)1241943173
|z (OCoLC)1300495838
|z (OCoLC)1303321556
|z (OCoLC)1303479061
|
037 |
|
|
|a CL0500000478
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b .N653 2014
|
072 |
|
7 |
|a POL
|x 004000
|2 bisacsh
|
072 |
|
7 |
|a POL
|x 035010
|2 bisacsh
|
082 |
0 |
4 |
|a 323.448
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Nolan, Catherine.
|
245 |
1 |
4 |
|a The audacity to spy :
|b how government, business, and hackers rob us of privacy /
|c Catherine Nolan, Ashley M. Wilson.
|
246 |
3 |
0 |
|a How government, business, and hackers rob us of privacy
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Basking Ridge, NJ :
|b Technics Publications,
|c 2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed September 17, 2014).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
8 |
|
|a Annotation
|b The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Political Freedom & Security
|x Civil Rights.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Political Freedom & Security
|x Human Rights.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
700 |
1 |
|
|a Wilson, Ashley M.
|
776 |
0 |
|
|z 1935504797
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1005061
|z Texto completo
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1005061
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12478197
|
994 |
|
|
|a 92
|b IZTAP
|