Fancy Bear goes phishing: the dark history of the information age, in five extraordinary hacks
(Book)
Author:
Status:
Cary Regional - Adult Non-Fiction has 4
364.168 SHAPI
Holly Springs Community - Adult Non-Fiction
364.168 SHAPI
Leesville Community - Adult Non-Fiction
364.168 SHAPI
Copies
Location
Call Number
Status
Cary Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Cary Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Cary Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Cary Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Eva H. Perry Regional - Adult Non-Fiction
364.168 SHAPI
Checked out
Holly Springs Community - Adult Non-Fiction
364.168 SHAPI
On Shelf
Leesville Community - Adult Non-Fiction
364.168 SHAPI
On Shelf
North Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Oberlin Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Oberlin Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Oberlin Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Oberlin Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
Southeast Regional - Adult Non-Fiction
364.168 SHAPI
On Shelf
More Details
Published:
New York : Farrar, Straus and Giroux, 2023.
Format:
Book
Edition:
First edition.
Physical Desc:
420 pages : illustrations ; 24 cm
Language:
English
ISBN:
9780374601171, 0374601178, 9780374601171, 0374601178
Notes
Bibliography
Includes bibliographical references and index.
Description
"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--,Provided by publisher.
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation (style guide)
Shapiro, S. J. (2023). Fancy Bear goes phishing: the dark history of the information age, in five extraordinary hacks. First edition. Farrar, Straus and Giroux.
Chicago / Turabian - Author Date Citation (style guide)Shapiro, Scott J. 2023. Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. Farrar, Straus and Giroux.
Chicago / Turabian - Humanities Citation (style guide)Shapiro, Scott J, Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. Farrar, Straus and Giroux, 2023.
MLA Citation (style guide)Shapiro, Scott J. Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. First edition. Farrar, Straus and Giroux, 2023.
Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
Staff View
Grouped Work ID:
c471e33b-d410-01aa-a2b7-fb39de78f9b9
Record Information
Last Horizon Extract Time | Aug 02, 2025 05:23:35 PM |
---|---|
Last File Modification Time | Aug 03, 2025 05:15:48 AM |
Last Grouped Work Modification Time | Aug 03, 2025 05:12:36 AM |
MARC Record
LEADER | 02836pam a2200577 i 4500 | ||
---|---|---|---|
001 | 2022057852 | ||
003 | DLC | ||
005 | 20230603090000.0 | ||
008 | 221202s2023 nyua b 001 0 eng | ||
010 | |a 2022057852 | ||
020 | |a 9780374601171 |c $30.00 | ||
020 | |a 0374601178 |c $30.00 | ||
020 | |a 9780374601171 |q (hardcover) | ||
020 | |a 0374601178 |q (hardback) | ||
035 | |a (OCoLC)1345214941 | ||
040 | |a DLC |b eng |e rda |c DLC |d DLC |d TnLvILS |d UtOrBLW | ||
042 | |a pcc | ||
050 | 0 | 0 | |a HV6773 |b .S534 2023 |
082 | 0 | 0 | |a 364.16/8 |2 23 |
092 | |a 364.168 SHAPI | ||
100 | 1 | |a Shapiro, Scott J. |e author. |4 aut | |
245 | 1 | 0 | |a Fancy Bear goes phishing : |b the dark history of the information age, in five extraordinary hacks / |c Scott J. Shapiro. |
250 | |a First edition. | ||
264 | 1 | |a New York : |b Farrar, Straus and Giroux, |c 2023. | |
300 | |a 420 pages : |b illustrations ; |c 24 cm | ||
336 | |a text |b txt |2 rdacontent | ||
336 | |a still image |b sti |2 rdacontent | ||
337 | |a unmediated |b n |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a "A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"-- |c Provided by publisher. | ||
650 | 0 | |a Hacking |v Case studies. | |
650 | 0 | |a Phishing |v Case studies. | |
650 | 0 | |a Internet |x Security measures | |
655 | 7 | |a Case studies |2 lcgft | |
949 | |b 32046829811814 |c SYSANFI |d 364.168 SHAPI |l CRY |n 8320772 |o 0 |s i |w 03/30/2023 |x 7 |y BK | ||
949 | |b 32046829811806 |c SYSANFI |d 364.168 SHAPI |l CRY |n 8320771 |o 0 |s i |w 03/30/2023 |x 9 |y BK | ||
949 | |b 32046829811905 |c SYSANFI |d 364.168 SHAPI |l CRY |n 8320781 |o 0 |s i |w 03/30/2023 |x 5 |y BK | ||
949 | |b 32046829811871 |c SYSANFI |d 364.168 SHAPI |l CRY |n 8320778 |o 0 |s i |w 03/30/2023 |x 5 |y BK | ||
949 | |b 32046829811913 |c SYSANFI |d 364.168 SHAPI |l EVA |n 8320782 |o 0 |s o |w 03/30/2023 |x 7 |y BK | ||
949 | |b 32046829811863 |c SYSANFI |d 364.168 SHAPI |l HSP |n 8320777 |o 0 |s i |w 03/30/2023 |x 6 |y BK | ||
949 | |b 32046829811921 |c SYSANFI |d 364.168 SHAPI |l LEE |n 8320783 |o 0 |s i |w 03/30/2023 |x 3 |y BK | ||
949 | |b 32046829811889 |c SYSANFI |d 364.168 SHAPI |l NOR |n 8320779 |o 0 |s i |w 03/30/2023 |x 6 |y BK | ||
949 | |b 32046829811798 |c SYSANFI |d 364.168 SHAPI |l OBR |n 8320770 |o 0 |s i |w 03/30/2023 |x 2 |y BK | ||
949 | |b 32046829811822 |c SYSANFI |d 364.168 SHAPI |l OBR |n 8320773 |o 0 |s i |w 03/30/2023 |x 3 |y BK | ||
949 | |b 32046829811830 |c SYSANFI |d 364.168 SHAPI |l OBR |n 8320774 |o 0 |s i |w 03/30/2023 |x 4 |y BK | ||
949 | |b 32046829811780 |c SYSANFI |d 364.168 SHAPI |l OBR |n 8320769 |o 0 |s i |w 03/30/2023 |x 5 |y BK | ||
949 | |b 32046829811855 |c SYSANFI |d 364.168 SHAPI |l SER |n 8320776 |o 0 |s i |w 03/30/2023 |x 1 |y BK | ||
949 | |b 32046829811897 |c SYSANFI |d 364.168 SHAPI |l WRL |n 8320780 |o 0 |s st |w 03/30/2023 |x 2 |y BK | ||
949 | |b 32046829811848 |c SYSANFI |d 364.168 SHAPI |l WRL |n 8320775 |o 1 |s l |w 03/30/2023 |x 4 |y BK | ||
999 | |a 773671 |