Cyber attack survival manual : (Record no. 1233)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01311nam a22002897a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250527150317.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250527b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781681881751 pbk. |
| International Standard Book Number | 1681881756 pbk. |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Language of cataloging | eng |
| Transcribing agency | DLC |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | HV6773 |
| Item number | S45 2017 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Edition number | 23 |
| Classification number | 005.8 Se4816 |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Relator code | Selby, Nick |
| Relator term | author |
| 245 ## - TITLE STATEMENT | |
| Title | Cyber attack survival manual : |
| Remainder of title | from identity theft to the digital apocalypse and everything in between |
| Statement of responsibility, etc. | Nick Selby and Heather Vescent |
| 250 ## - EDITION STATEMENT | |
| Edition statement | Illustrated edition |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc. | San Francisco, California : |
| Name of publisher, distributor, etc. | Weldon Owen |
| Date of publication, distribution, etc. | [2017] |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 224 p.: |
| Other physical details | color illustrations |
| Dimensions | 25 cm |
| 500 ## - GENERAL NOTE | |
| General note | "Practical manual withstands heavy-duty use indoors and out"--Page [4] of cover |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cybersecurity experts present an accessible, informative, and fully illustrated guide to protecting yourself, your assets, and your loved ones online. Explores how hackers make money, what they target, and provides hands-on hints for fighting back against threats from identity theft to larger societal cyber risks. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Vescent, Heather, |
| Relator term | author |
| Personal name | Olson, Eric |
| Relator term | author |
| 830 ## - SERIES ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | Survival series |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | BOOKS |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | BOOK | KUWAIT TECHNICAL COLLEGE LIBRARY | KUWAIT TECHNICAL COLLEGE LIBRARY | Lib Office | 29.11.2023 | Purchase | 005.8 Se4816 | 01666 | 27.05.2025 | 27.05.2025 | BOOKS | Not for loan |