Fancy Bear goes phishing: the dark history of the information age, in five extraordinary hacks
(Book)

Book Cover
Your Rating: 0 stars
Star rating for

Status:
Cary Regional - Adult Non-Fiction has 4
364.168 SHAPI
Holly Springs Community - Adult Non-Fiction
364.168 SHAPI
Leesville Community - Adult Non-Fiction
364.168 SHAPI

Also in This Series

Copies

Location
Call Number
Status
Cary Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Cary Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Cary Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Cary Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Eva H. Perry Regional - Adult Non-Fiction
364.168 SHAPI
Checked out
Holly Springs Community - Adult Non-Fiction
364.168 SHAPI
On Shelf
Leesville Community - Adult Non-Fiction
364.168 SHAPI
On Shelf
North Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Oberlin Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Oberlin Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Oberlin Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Oberlin Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Southeast Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf

More Details

Published:
New York : Farrar, Straus and Giroux, 2023.
Format:
Book
Edition:
First edition.
Physical Desc:
420 pages : illustrations ; 24 cm
Language:
English
ISBN:
9780374601171, 0374601178, 9780374601171, 0374601178

Notes

Bibliography
Includes bibliographical references and index.
Description
"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--,Provided by publisher.

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation (style guide)

Shapiro, S. J. (2023). Fancy Bear goes phishing: the dark history of the information age, in five extraordinary hacks. First edition. Farrar, Straus and Giroux.

Chicago / Turabian - Author Date Citation (style guide)

Shapiro, Scott J. 2023. Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. Farrar, Straus and Giroux.

Chicago / Turabian - Humanities Citation (style guide)

Shapiro, Scott J, Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. Farrar, Straus and Giroux, 2023.

MLA Citation (style guide)

Shapiro, Scott J. Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. First edition. Farrar, Straus and Giroux, 2023.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.

Staff View

Grouped Work ID:
c471e33b-d410-01aa-a2b7-fb39de78f9b9
Go To Grouped Work

Record Information

Last Horizon Extract TimeAug 02, 2025 05:23:35 PM
Last File Modification TimeAug 03, 2025 05:15:48 AM
Last Grouped Work Modification TimeAug 03, 2025 05:12:36 AM

MARC Record

LEADER02836pam a2200577 i 4500
001  2022057852
003DLC
00520230603090000.0
008221202s2023    nyua     b    001 0 eng  
010 |a  2022057852
020 |a 9780374601171 |c $30.00
020 |a 0374601178 |c $30.00
020 |a 9780374601171 |q (hardcover)
020 |a 0374601178 |q (hardback)
035 |a (OCoLC)1345214941
040 |a DLC |b eng |e rda |c DLC |d DLC |d TnLvILS |d UtOrBLW
042 |a pcc
05000 |a HV6773 |b .S534 2023
08200 |a 364.16/8 |2 23
092 |a 364.168 SHAPI
1001 |a Shapiro, Scott J. |e author. |4 aut
24510 |a Fancy Bear goes phishing : |b the dark history of the information age, in five extraordinary hacks / |c Scott J. Shapiro.
250 |a First edition.
2641 |a New York : |b Farrar, Straus and Giroux, |c 2023.
300 |a 420 pages : |b illustrations ; |c 24 cm
336 |a text |b txt |2 rdacontent
336 |a still image |b sti |2 rdacontent
337 |a unmediated |b n |2 rdamedia
338 |a volume |b nc |2 rdacarrier
504 |a Includes bibliographical references and index.
520 |a "A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"-- |c Provided by publisher.
6500 |a Hacking |v Case studies.
6500 |a Phishing |v Case studies.
6500 |a Internet |x Security measures
6557 |a Case studies |2 lcgft
949 |b 32046829811814 |c SYSANFI |d 364.168 SHAPI |l CRY |n 8320772 |o 0 |s i |w 03/30/2023 |x 7 |y BK
949 |b 32046829811806 |c SYSANFI |d 364.168 SHAPI |l CRY |n 8320771 |o 0 |s i |w 03/30/2023 |x 9 |y BK
949 |b 32046829811905 |c SYSANFI |d 364.168 SHAPI |l CRY |n 8320781 |o 0 |s i |w 03/30/2023 |x 5 |y BK
949 |b 32046829811871 |c SYSANFI |d 364.168 SHAPI |l CRY |n 8320778 |o 0 |s i |w 03/30/2023 |x 5 |y BK
949 |b 32046829811913 |c SYSANFI |d 364.168 SHAPI |l EVA |n 8320782 |o 0 |s o |w 03/30/2023 |x 7 |y BK
949 |b 32046829811863 |c SYSANFI |d 364.168 SHAPI |l HSP |n 8320777 |o 0 |s i |w 03/30/2023 |x 6 |y BK
949 |b 32046829811921 |c SYSANFI |d 364.168 SHAPI |l LEE |n 8320783 |o 0 |s i |w 03/30/2023 |x 3 |y BK
949 |b 32046829811889 |c SYSANFI |d 364.168 SHAPI |l NOR |n 8320779 |o 0 |s i |w 03/30/2023 |x 6 |y BK
949 |b 32046829811798 |c SYSANFI |d 364.168 SHAPI |l OBR |n 8320770 |o 0 |s i |w 03/30/2023 |x 2 |y BK
949 |b 32046829811822 |c SYSANFI |d 364.168 SHAPI |l OBR |n 8320773 |o 0 |s i |w 03/30/2023 |x 3 |y BK
949 |b 32046829811830 |c SYSANFI |d 364.168 SHAPI |l OBR |n 8320774 |o 0 |s i |w 03/30/2023 |x 4 |y BK
949 |b 32046829811780 |c SYSANFI |d 364.168 SHAPI |l OBR |n 8320769 |o 0 |s i |w 03/30/2023 |x 5 |y BK
949 |b 32046829811855 |c SYSANFI |d 364.168 SHAPI |l SER |n 8320776 |o 0 |s i |w 03/30/2023 |x 1 |y BK
949 |b 32046829811897 |c SYSANFI |d 364.168 SHAPI |l WRL |n 8320780 |o 0 |s st |w 03/30/2023 |x 2 |y BK
949 |b 32046829811848 |c SYSANFI |d 364.168 SHAPI |l WRL |n 8320775 |o 1 |s l |w 03/30/2023 |x 4 |y BK
999 |a 773671