Cyber privacy : (Record no. 21626)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01350nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520103025.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781948836920 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | JC 596.2.U5 .D67 2020 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Doss, April Falcon |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Cyber privacy : |
Remainder of title | who has your data and why you should care / |
Statement of responsibility, etc. | April Falcon Doss |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Dallas : |
Name of publisher, distributor, etc. | BenBella Books, Inc., |
Date of publication, distribution, etc. | c2020 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xiii, 370 pages ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | USD21 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | What kinds of data are we talking about, and what kind of privacy do we mean? -- If you're not paying for the product, you are the product -- Power play: How personal data exacerbates the power imbalances in everyday life -- Who's your Big Brother? -- Global rules in a connected world: How other countries handle data -- Pandora's Box: Data's dangers, and finding hope at the bottom of the box. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, explores the most common types of data being collected about individuals today and delve into how it is being used-sometimes against us-by the private sector, the government, and even our employers and schools. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER SECURITY |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Digital Forensic | LRC - Main | National University - Manila | General Circulation | 01/30/2024 | Purchased - Amazon | 21.00 | GC JC 596.2.U5 .D67 2020 | NULIB000019385 | 05/20/2025 | c.1 | 05/20/2025 | Books |