MARC details
000 -LEADER |
fixed length control field |
02822cam a2200325 i 4500 |
001 - CONTROL NUMBER |
control field |
20528422 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
JGU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200317092813.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180604s2018 nyu b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2018026844 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780393608885 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.8855 |
Item number |
.S36 2018 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
SC-C |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Schneier, Bruce |
9 (RLIN) |
35801 |
245 10 - TITLE STATEMENT |
Title |
Click here to kill everybody |
Remainder of title |
security and survival in a hyper-connected world |
Statement of responsibility, etc |
Bruce Schneier. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York |
Name of publisher, distributor, etc |
W.W.Norton |
Date of publication, distribution, etc |
2018 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
viii, 319p. |
Dimensions |
25 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction: everything is becoming a computer -- Computers are still hard to secure -- Patching is failing as a security paradigm -- Knowing who's who on the internet is getting harder -- Everyone favors insecurity -- Risks are becoming catastrophic -- What a secure internet looks like -- How we can secure the internet -- Government is who enables security -- How governments can prioritize defense -- Over offense -- Plan B: what's likely to happen -- Where policy can go wrong -- Towards a trusted, resilient -- And peaceful internet -- Conclusion: bring technology and policy together. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the risks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet |
General subdivision |
Security measures. |
9 (RLIN) |
35962 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet |
General subdivision |
Safety measures. |
9 (RLIN) |
66790 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet |
General subdivision |
Government policy. |
9 (RLIN) |
33428 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes. |
9 (RLIN) |
66791 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Print |