NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Ransomware and cybercrime / (Record no. 5198)

MARC details
000 -LEADER
fixed length control field 03654cam a2200529 i 4500
001 - CONTROL NUMBER
control field 9781003278214
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122827.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220512s2022 flu o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003278214
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003278213
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000585875
Qualifying information (electronic bk. ;
-- PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000585896
Qualifying information (electronic bk. ;
-- EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000585891
Qualifying information (electronic bk. ;
-- EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000585872
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032235493
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1032235497
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032235509
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1032235500
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9781003278214
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1316708230
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1316708230
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 032000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jenkinson, Andrew,
Relator term author.
245 10 - TITLE STATEMENT
Title Ransomware and cybercrime /
Statement of responsibility, etc. Andrew Jenkinson.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (1 volume)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need--no, we must demand--change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element BUSINESS & ECONOMICS
General subdivision Management.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Information Technology.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/e/9781003278214">https://www.taylorfrancis.com/books/e/9781003278214</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha