skip to content
Webster's new world hacker dictionary Preview this item
ClosePreview this item
Checking...

Webster's new world hacker dictionary

Author: Bernadette H Schell; Clemens Martin
Publisher: Indianapolis, IN : Wiley Pub., ©2006.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime - crackers have accessed information in the records of large, respected organizations, institutions, and even the military." "This unique book provides a chronology of  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Dictionaries
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Bernadette H Schell; Clemens Martin
ISBN: 0470047526 9780470047521
OCLC Number: 67840235
Description: xliv, 387 pages ; 24 cm
Contents: Preface. Acknowledgments. Introduction. Hacker Dictionary A-Z . Appendix A: How Do Hackers Break into Computers? by Carolyn Meinel. Appendix B: Resource Guide.
Other Titles: Hacker dictionary
Responsibility: Bernadette Schell and Clemens Martin.
More information:

Abstract:

The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace Hackers. Crackers. Phreakers. Black hats. White hats.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/67840235> # Webster's new world hacker dictionary
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "67840235" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/53132372#Place/indianapolis_in> ; # Indianapolis, IN
    schema:about <http://id.loc.gov/authorities/subjects/sh90001862> ; # Computer security
    schema:about <http://id.worldcat.org/fast/885802> ; # Cyberterrorism
    schema:about <http://id.loc.gov/authorities/subjects/sh00001974> ; # Cyberterrorism
    schema:about <http://id.worldcat.org/fast/872150> ; # Hackers
    schema:about <http://dewey.info/class/005.8003/e22/> ;
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://id.loc.gov/authorities/subjects/sh94005931> ; # Hackers
    schema:alternateName "Hacker dictionary" ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/70787284> ; # Clemens Martin
    schema:copyrightYear "2006" ;
    schema:creator <http://viaf.org/viaf/2443383> ; # Bernadette Hlubik Schell
    schema:datePublished "2006" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/53132372> ;
    schema:genre "Dictionaries"@en ;
    schema:inLanguage "en" ;
    schema:name "Webster's new world hacker dictionary"@en ;
    schema:productID "67840235" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/67840235#PublicationEvent/indianapolis_in_wiley_pub_2006> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/53132372#Agent/wiley_pub> ; # Wiley Pub.
    schema:reviews <http://www.worldcat.org/title/-/oclc/67840235#Review/-1524467998> ;
    schema:url <http://catdir.loc.gov/catdir/toc/ecip0613/2006013969.html> ;
    schema:workExample <http://worldcat.org/isbn/9780470047521> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA652573> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/67840235> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/53132372#Place/indianapolis_in> # Indianapolis, IN
    a schema:Place ;
    schema:name "Indianapolis, IN" ;
    .

<http://id.loc.gov/authorities/subjects/sh00001974> # Cyberterrorism
    a schema:Intangible ;
    schema:name "Cyberterrorism"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh90001862> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94005931> # Hackers
    a schema:Intangible ;
    schema:name "Hackers"@en ;
    .

<http://id.worldcat.org/fast/872150> # Hackers
    a schema:Intangible ;
    schema:name "Hackers"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/885802> # Cyberterrorism
    a schema:Intangible ;
    schema:name "Cyberterrorism"@en ;
    .

<http://viaf.org/viaf/2443383> # Bernadette Hlubik Schell
    a schema:Person ;
    schema:birthDate "1952" ;
    schema:familyName "Schell" ;
    schema:givenName "Bernadette Hlubik" ;
    schema:givenName "Bernadette H." ;
    schema:name "Bernadette Hlubik Schell" ;
    .

<http://viaf.org/viaf/70787284> # Clemens Martin
    a schema:Person ;
    schema:familyName "Martin" ;
    schema:givenName "Clemens" ;
    schema:name "Clemens Martin" ;
    .

<http://worldcat.org/isbn/9780470047521>
    a schema:ProductModel ;
    schema:isbn "0470047526" ;
    schema:isbn "9780470047521" ;
    .

<http://www.worldcat.org/title/-/oclc/67840235#Review/-1524467998>
    a schema:Review ;
    schema:itemReviewed <http://www.worldcat.org/oclc/67840235> ; # Webster's new world hacker dictionary
    schema:reviewBody ""Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime - crackers have accessed information in the records of large, respected organizations, institutions, and even the military." "This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today's Fear of a Cyber-Apocalypse Era. An appendix entitled "How Do Hackers Break into Computers?" details some of the ways crackers access and steal information."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.