<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <nonSort>The </nonSort>
    <title>best of 2600</title>
    <subTitle>a hacker odyssey</subTitle>
  </titleInfo>
  <titleInfo type="alternative">
    <title>Best of 2,600</title>
  </titleInfo>
  <titleInfo type="alternative">
    <title>Best of two thousand six hundred</title>
  </titleInfo>
  <titleInfo type="uniform">
    <title>2600</title>
  </titleInfo>
  <name type="personal">
    <namePart>Goldstein, Emmanuel</namePart>
    <namePart type="date">1959-</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="corporate">
    <namePart>ebrary, Inc</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="marc">biography</genre>
  <genre authority="local">Electronic books.</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">inu</placeTerm>
    </place>
    <place>
      <placeTerm type="text">Indianapolis, IN</placeTerm>
    </place>
    <publisher>Wiley Pub.</publisher>
    <dateIssued>c2008</dateIssued>
    <dateIssued encoding="marc">2008</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">electronic</form>
    <form authority="gmd">electronic resource</form>
    <extent>xvi, 871 p. : ill.</extent>
  </physicalDescription>
  <note type="statement of responsibility">Emmanuel Goldstein.</note>
  <note>Includes index.</note>
  <note>Electronic reproduction. Palo Alto, Calif. : ebrary, 2009. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.</note>
  <subject authority="lcsh">
    <topic>Computer security</topic>
    <topic>History</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer crimes</topic>
    <topic>History</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer hackers</topic>
    <topic>History</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Telecommunication</topic>
    <topic>Security measures</topic>
    <topic>History</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Wiretapping</topic>
    <topic>History</topic>
  </subject>
  <classification authority="lcc">QA76.9.A25 G643 2008eb</classification>
  <classification authority="ddc" edition="22">005.8</classification>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="lccn" invalid="yes"/>
  <identifier type="uri">http://site.ebrary.com/lib/rucke/Doc?id=10248937</identifier>
  <location>
    <url>http://site.ebrary.com/lib/rucke/Doc?id=10248937</url>
  </location>
  <recordInfo>
    <recordContentSource authority="marcorg">CaPaEBR</recordContentSource>
    <recordCreationDate encoding="marc">080422</recordCreationDate>
    <recordIdentifier source="CaPaEBR">ebr10248937</recordIdentifier>
  </recordInfo>
</mods>
