Cybercrime / (Record no. 23342)
| 000 -LEADER | |
|---|---|
| fixed length control field | 01069cam a22002895i 4500 |
| 001 - CONTROL NUMBER | |
| control field | 20764516 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | GOODL |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20190923133135.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 181130s2020 mnu 000 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2018966068 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781532118906 (lib. bdg.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781644940815 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781532173080 (ebk.) |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Language of cataloging | eng |
| Description conventions | rda |
| Transcribing agency | DLC |
| Modifying agency | DLC |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 621 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Hudak, Heather C. |
| 245 10 - TITLE STATEMENT | |
| Title | Cybercrime / |
| Statement of responsibility, etc | Heather C. Hudak. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Name of publisher, distributor, etc | Abdo Publishing |
| Date of publication, distribution, etc | 2019 |
| 263 ## - PROJECTED PUBLICATION DATE | |
| Projected publication date | 2009 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 48 pages ; 24 cm. |
| 490 0# - SERIES STATEMENT | |
| Series statement | Privacy in the digital age |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Computer networks allow people to easily share information. Organizations and entire cities rely on computer networks. Hackers can break into networks to disrupt systems or steal data. Hacking and other cybercrimes are on the rise. Cybercrime explores common cybercrimes and how people can guard against these threats. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
| a | 0 |
| b | ibc |
| c | orignew |
| d | 2 |
| e | epcn |
| f | 20 |
| g | y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | BOOK |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Young Adult Reading Level | Goodland | Goodland | Young Adult Non-Fiction | 09/23/2019 | SEBCO | YA 621 HUD | 39124000271844 | 09/23/2019 | 32.99 | 09/23/2019 | BOOK |