|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
13712906 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
231110s2023 cau o 000 0 eng d |
005 |
20241127154520.0 |
035 |
|
|
|a (OCoLC)1408533056
|
035 |
|
9 |
|a (OCLCCM-CC)1408533056
|
040 |
|
|
|a YDX
|b eng
|c YDX
|d ORMDA
|d OCLCF
|d OCLCO
|
020 |
|
|
|a 9781098145644
|q (electronic bk.)
|
020 |
|
|
|a 109814564X
|q (electronic bk.)
|
020 |
|
|
|z 1098145674
|
020 |
|
|
|z 9781098145675
|
037 |
|
|
|a 9781098145668
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.59
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Crawley, Kim,
|e author.
|0 http://id.loc.gov/authorities/names/no2023100299
|
245 |
1 |
0 |
|a HACKER CULTURE A TO Z :
|b a fun guide to the people, ideas, and gadgets that made the tech world /
|c Kim Crawley.
|
250 |
|
|
|a First edtion.
|
260 |
|
|
|a [Sebastopol, California] :
|b O'Reilly Media, Inc.,
|c 2023.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones.
|
650 |
|
0 |
|a Hacking.
|0 http://id.loc.gov/authorities/subjects/sh2013002597
|
650 |
|
0 |
|a Computer security.
|0 http://id.loc.gov/authorities/subjects/sh90001862
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 1098145674
|z 9781098145675
|w (OCoLC)1378825861
|
856 |
4 |
0 |
|u https://go.oreilly.com/uchicago/library/view/-/9781098145668/?ar
|y O'Reilly
|
929 |
|
|
|a oclccm
|
999 |
f |
f |
|s de530122-c076-46be-b0d7-56c289458a0e
|i cf693351-9413-41ff-885d-acf051b1094b
|
928 |
|
|
|t Library of Congress classification
|a TK5105.59
|l Online
|c UC-FullText
|u https://go.oreilly.com/uchicago/library/view/-/9781098145668/?ar
|z O'Reilly
|g ebooks
|i 13855847
|