|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
in00005944816 |
003 |
OCoLC |
005 |
20220616034605.0 |
008 |
180712t20192019mau 000 0beng c |
010 |
|
|
|a 2018024873
|
020 |
|
|
|a 9780544903210
|q (hardcover)
|
020 |
|
|
|a 0544903218
|q (hardcover)
|
035 |
|
|
|a (OCoLC)1016650492
|
040 |
|
|
|a PUL
|b eng
|e rda
|c PUL
|d OCLCF
|d TOH
|d IK2
|d IHY
|d QQ3
|d BUR
|d TXMAL
|d DLC
|d T7B
|d TXWBR
|d OCLCO
|d SSH
|d CUY
|d UtOrBLW
|
042 |
|
|
|a pcc
|
043 |
|
|
|a n-us---
|
049 |
|
|
|a EEMR
|
050 |
0 |
0 |
|a HV6772.A5
|b S55 2019
|
082 |
0 |
0 |
|a 005.8092
|a B
|2 23
|
100 |
1 |
|
|a Smith, Jeremy N.,
|e author.
|0 http://id.loc.gov/authorities/names/no2010052860
|
245 |
1 |
0 |
|a Breaking and entering :
|b the extraordinary story of a hacker called "Alien" /
|c Jeremy N. Smith.
|
264 |
|
1 |
|a Boston :
|b Houghton Mifflin Harcourt,
|c 2019.
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a xii, 292 pages ;
|c 24 cm
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|
500 |
|
|
|a "An Eamon Dolan Book."
|
505 |
0 |
|
|a Preface: The hacker next door -- Part I: Course 19. Inside out ; The coffeehouse club ; Earth to Alien ; A death in the family -- Part II: In security. Up all night ; I spy ; Wild wild web ; A hackable heart transplant -- Part III: Agents and Jedis. Capture the flag ; Check, please ; Up in the air ; Europe on five hacks a day -- Part IV: Owner's manual. The bartender ; The best around ; Phoning home -- Epilogue: Fast forward.
|
520 |
|
|
|a "This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien"--
|c Provided by publisher.
|
520 |
|
|
|a "This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons--and the trespassing and social engineering talents she had developed while 'hacking' at MIT. The company tested its clients' security by every means possible--not just coding, but donning disguises and sneaking past guards and secretaries into the C suite. Alien now runs a boutique hacking outfit that caters to some of the world's biggest and most vulnerable institutions--banks, retailers, government agencies. Her work combines devilish charm, old school deception, and next generation spycraft. In [this book], cybersecurity finally gets the rich, character driven, fast-paced treatment it deserves."--Dust jacket.
|
600 |
0 |
0 |
|a Alien
|c (Hacker)
|0 http://id.loc.gov/authorities/names/no2018093627
|
600 |
1 |
4 |
|a Alien
|c (Hacker.)
|
650 |
|
0 |
|a Hackers
|z United States
|v Biography.
|0 http://id.loc.gov/authorities/subjects/sh94005931
|
650 |
|
0 |
|a Computer security
|z United States.
|0 http://id.loc.gov/authorities/subjects/sh2008101478
|
650 |
|
0 |
|a Computer crimes
|z United States.
|0 http://id.loc.gov/authorities/subjects/sh2008117724
|
650 |
|
7 |
|a Computer crimes.
|2 fast
|0 (OCoLC)fst00872063
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
650 |
|
7 |
|a COMPUTERS / Security / General.
|2 bisacsh
|
650 |
|
7 |
|a TRUE CRIME / Hoaxes & Deceptions.
|2 bisacsh
|
650 |
|
7 |
|a BIOGRAPHY & AUTOBIOGRAPHY / Science & Technology.
|2 bisacsh
|
650 |
|
1 |
|a Hackers
|z United States
|v Biography.
|
650 |
|
4 |
|a Computer crimes
|z United States.
|
650 |
|
4 |
|a Computer hackers
|z United States
|v Biography.
|
650 |
|
4 |
|a Computer security
|z United States.
|
655 |
|
7 |
|a Biographies.
|2 lcgft
|0 http://id.loc.gov/authorities/genreForms/gf2014026049
|
655 |
|
7 |
|a Biographies.
|2 fast
|0 (OCoLC)fst01919896
|
776 |
0 |
8 |
|i Online version:
|a Smith, Jeremy N.
|t Breaking and entering.
|d Boston : Houghton Mifflin Harcourt, 2019
|z 9780544911222
|w (DLC) 2018035206
|
907 |
|
|
|y .b130520767
|b 210803
|c 190213
|
998 |
|
|
|a mn
|b 190306
|c m
|d a
|e -
|f eng
|g mau
|h 0
|i 2
|
994 |
|
|
|a 92
|b EEM
|
999 |
f |
f |
|i 089ec153-db96-5ba7-9c99-3cf1a9a87bfa
|s ba7a6a52-0967-5978-9f58-b6088ddd9419
|t 0
|
952 |
f |
f |
|p Can Circulate
|a Michigan State University-Library of Michigan
|b Michigan State University
|c MSU Main Library
|d MSU Main Library
|t 0
|e HV6772.A5 S55 2019
|h Library of Congress classification
|i Printed Material
|m 31293036477754
|n 1
|