Software piracy exposed:
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epi...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress
2005
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781932266986/?ar |
Zusammenfassung: | This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource (xvi, 310 Seiten) illustrations |
ISBN: | 1423754239 9781423754237 1932266984 9781932266986 9780080489735 0080489737 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051700883 | ||
003 | DE-627-1 | ||
005 | 20240228114002.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2005 xx |||||o 00| ||eng c | ||
020 | |a 1423754239 |c electronic bk. |9 1-4237-5423-9 | ||
020 | |a 9781423754237 |c electronic bk. |9 978-1-4237-5423-7 | ||
020 | |a 1932266984 |9 1-932266-98-4 | ||
020 | |a 9781932266986 |9 978-1-932266-98-6 | ||
020 | |a 9780080489735 |9 978-0-08-048973-5 | ||
020 | |a 0080489737 |9 0-08-048973-7 | ||
035 | |a (DE-627-1)051700883 | ||
035 | |a (DE-599)KEP051700883 | ||
035 | |a (ORHE)9781932266986 | ||
035 | |a (DE-627-1)051700883 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a TRU |2 bisacsh | |
082 | 0 | |a 364.168 |2 22 | |
100 | 1 | |a Craig, Paul |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Software piracy exposed |c Paul Craig, Ron Honick ; Mark Burnett, technical editor |
264 | 1 | |a Rockland, MA |b Syngress |c 2005 | |
300 | |a 1 Online-Ressource (xvi, 310 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software. | ||
650 | 0 | |a Acquisition of computer software | |
650 | 0 | |a Computer crimes | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Acquisitions (Bibliothèques) ; Logiciels | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a TRUE CRIME ; White Collar Crime | |
650 | 4 | |a Acquisition of computer software | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer security | |
700 | 1 | |a Honick, Ron |e MitwirkendeR |4 ctb | |
700 | 1 | |a Burnett, Mark |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1932266984 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1932266984 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781932266986/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051700883 |
---|---|
_version_ | 1821494841292357632 |
adam_text | |
any_adam_object | |
author | Craig, Paul |
author2 | Honick, Ron Burnett, Mark |
author2_role | ctb ctb |
author2_variant | r h rh m b mb |
author_facet | Craig, Paul Honick, Ron Burnett, Mark |
author_role | aut |
author_sort | Craig, Paul |
author_variant | p c pc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051700883 (DE-599)KEP051700883 (ORHE)9781932266986 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02975cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-051700883</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114002.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2005 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754239</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-5423-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754237</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-5423-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266984</subfield><subfield code="9">1-932266-98-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266986</subfield><subfield code="9">978-1-932266-98-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489735</subfield><subfield code="9">978-0-08-048973-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489737</subfield><subfield code="9">0-08-048973-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051700883</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051700883</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781932266986</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051700883</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TRU</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Craig, Paul</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software piracy exposed</subfield><subfield code="c">Paul Craig, Ron Honick ; Mark Burnett, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 310 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Acquisition of computer software</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Acquisitions (Bibliothèques) ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TRUE CRIME ; White Collar Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Acquisition of computer software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Honick, Ron</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Burnett, Mark</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1932266984</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1932266984</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781932266986/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051700883 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:47Z |
institution | BVB |
isbn | 1423754239 9781423754237 1932266984 9781932266986 9780080489735 0080489737 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 310 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress |
record_format | marc |
spelling | Craig, Paul VerfasserIn aut Software piracy exposed Paul Craig, Ron Honick ; Mark Burnett, technical editor Rockland, MA Syngress 2005 1 Online-Ressource (xvi, 310 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software. Acquisition of computer software Computer crimes Computer security Computer Security Acquisitions (Bibliothèques) ; Logiciels Criminalité informatique Sécurité informatique TRUE CRIME ; White Collar Crime Honick, Ron MitwirkendeR ctb Burnett, Mark MitwirkendeR ctb 1932266984 Erscheint auch als Druck-Ausgabe 1932266984 |
spellingShingle | Craig, Paul Software piracy exposed Acquisition of computer software Computer crimes Computer security Computer Security Acquisitions (Bibliothèques) ; Logiciels Criminalité informatique Sécurité informatique TRUE CRIME ; White Collar Crime |
title | Software piracy exposed |
title_auth | Software piracy exposed |
title_exact_search | Software piracy exposed |
title_full | Software piracy exposed Paul Craig, Ron Honick ; Mark Burnett, technical editor |
title_fullStr | Software piracy exposed Paul Craig, Ron Honick ; Mark Burnett, technical editor |
title_full_unstemmed | Software piracy exposed Paul Craig, Ron Honick ; Mark Burnett, technical editor |
title_short | Software piracy exposed |
title_sort | software piracy exposed |
topic | Acquisition of computer software Computer crimes Computer security Computer Security Acquisitions (Bibliothèques) ; Logiciels Criminalité informatique Sécurité informatique TRUE CRIME ; White Collar Crime |
topic_facet | Acquisition of computer software Computer crimes Computer security Computer Security Acquisitions (Bibliothèques) ; Logiciels Criminalité informatique Sécurité informatique TRUE CRIME ; White Collar Crime |
work_keys_str_mv | AT craigpaul softwarepiracyexposed AT honickron softwarepiracyexposed AT burnettmark softwarepiracyexposed |