Worm : (Record no. 151914)

000 -LEADER
fixed length control field 01748cam a2200277Ma 4500
001 - CONTROL NUMBER
control field 9910415014401591
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190312161425.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120314t20122011nyu e 001 0 eng
009 - PHYSICAL DESCRIPTION FIXED-FIELD FOR ARCHIVAL COLLECTION (VM) [OBSOLETE]
fixed length control field u1041501
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781611856064 (hbk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 161185606X (hbk)
035 ## - SYSTEM CONTROL NUMBER
System control number (UK-LoICS)u1041501-44imp_inst
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn781074002
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)781074002
040 ## - CATALOGING SOURCE
Original cataloging agency AU@
Language of cataloging eng
Transcribing agency AU@
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bowden, Mark,
Dates associated with a name 1951-
245 10 - TITLE STATEMENT
Title Worm :
Remainder of title the first digital world war /
Statement of responsibility, etc. Mark Bowden.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. Grove,
Date of publication, distribution, etc. 2012, c2011.
300 ## - PHYSICAL DESCRIPTION
Extent x, 291 p. ;
Dimensions 25 cm.
520 ## - SUMMARY, ETC.
Summary, etc. Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within weeks. Once the worm infiltrated one system it was able to link that system with others to form a single network under illicit outside control, a situation known as a "botnet, " soon capable of overpowering any of the vital computer networks that today control banking, telephone service, energy flow, air traffic, health-care information, even the Internet itself. This book reports on the battle between those determined to exploit the Internet and those committed to protect it.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer viruses.
9 (RLIN) 2342
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 8021
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security equipment industry.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
9 (RLIN) 2343
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
Koha biblionumber 151914
Koha biblioitemnumber 151914
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Permanent location Current location Shelving location Date acquired Full call number Barcode Date last seen Koha item type
        Science & Technology Studies Collection Science Museum London Science Museum London Dana Research Centre Library: Books 2015-09-17 681.322:342.7 BOWDEN 2402581962 2019-02-19 Book