|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
8374293 |
005 |
20111025173000.0 |
008 |
100701s2011 nyu b 000 0 eng |
003 |
ICU |
010 |
|
|
|a 2010027952
|
020 |
|
|
|a 9780307588685
|
020 |
|
|
|a 0307588688
|
020 |
|
|
|a 9780307588708 (ebk.)
|
020 |
|
|
|a 030758870X (ebk.)
|
035 |
|
|
|a 8374293
|
035 |
|
|
|a 2010027952
|
035 |
|
|
|a (OCoLC)635461083
|
040 |
|
|
|a DLC
|c DLC
|d BTCTA
|d UPZ
|d YDXCP
|d OCO
|d UtOrBLW
|
042 |
|
|
|a pcc
|
043 |
|
|
|a n-us---
|
050 |
0 |
0 |
|a HV6773.2
|b .P68 2011
|
082 |
0 |
0 |
|a 364.16/8092
|2 22
|
100 |
1 |
|
|a Poulsen, Kevin,
|d 1965-
|0 http://id.loc.gov/authorities/names/n96098233,
|e author
|1 http://viaf.org/viaf/38646163/
|1 http://dbpedia.org/resource/Kevin_Poulsen
|
245 |
1 |
0 |
|a Kingpin :
|b how one hacker took over the billion-dollar cybercrime underground /
|c Kevin Poulsen.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a New York :
|b Crown Publishers,
|c c2011.
|
300 |
|
|
|a xiii, 266 pages ;
|c 25 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
504 |
|
|
|a Includes bibliographical references (pages [243]-263).
|
520 |
|
|
|a Poulsen explores in this page-turning tale the criminal exploits of a hacker of breathtaking ambition, Max Butler, who stole access to 1.8 million credit card accounts.
|
600 |
1 |
0 |
|a Butler, Max.
|0 http://id.loc.gov/authorities/names/n2010042749
|1 http://viaf.org/viaf/71397821/
|1 http://viaf.org/viaf/139793729
|
650 |
|
0 |
|a Computer crimes
|z United States
|v Case studies.
|
650 |
|
0 |
|a Computer hackers
|z United States
|v Case studies.
|
650 |
|
0 |
|a Commercial criminals
|z United States
|v Case studies.
|
600 |
1 |
7 |
|a Butler, Max.
|2 fast
|0 http://id.worldcat.org/fast/fst01777975
|0 http://id.worldcat.org/fast/1777975
|1 http://viaf.org/viaf/71397821/
|1 http://viaf.org/viaf/139793729
|
650 |
|
7 |
|a Commercial criminals.
|2 fast
|0 http://id.worldcat.org/fast/fst00869477
|0 http://id.worldcat.org/fast/869477
|
650 |
|
7 |
|a Computer crimes.
|2 fast
|0 http://id.worldcat.org/fast/fst00872063
|0 http://id.worldcat.org/fast/872063
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 http://id.worldcat.org/fast/fst00872150
|0 http://id.worldcat.org/fast/872150
|
651 |
|
7 |
|a United States.
|2 fast
|0 http://id.worldcat.org/fast/fst01204155
|0 http://id.worldcat.org/fast/1204155
|
655 |
|
7 |
|a Case studies.
|2 fast
|0 http://id.worldcat.org/fast/fst01423765
|0 http://id.worldcat.org/fast/1423765
|
903 |
|
|
|a HeVa
|
903 |
|
|
|a HeVa
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i 5e4751dc-98da-5f38-984f-16f03dd36fb4
|s d7378599-a129-5135-be5a-8fa10dac8559
|
928 |
|
|
|t Library of Congress classification
|a HV6773.2 .P68 2011
|l DLL
|c DLL-Law
|i 1032196
|
927 |
|
|
|t Library of Congress classification
|a HV6773.2 .P68 2011
|l DLL
|c DLL-Law
|e PUTT
|b 65945446
|i 8910345
|