Cyberterrorism -- Fiction
Resource Information
The concept Cyberterrorism -- Fiction represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
The Resource
Cyberterrorism -- Fiction
Resource Information
The concept Cyberterrorism -- Fiction represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
- Label
- Cyberterrorism -- Fiction
69 Items that share the Concept Cyberterrorism -- Fiction
Context
Context of Cyberterrorism -- FictionSubject of
No resources found
No enriched resources found
- 8 minutes to-- digital winter
- 8 minutes to-- digital winter
- Acts of vanishing
- After the flare
- Against all silence
- Bounty
- Compromised identity
- Cutting edge
- Dark justice
- Dark justice
- Dark winter
- Dark zone
- Data Jack
- Day one
- Deep Black, Payback
- Digital winter
- End of secrets
- Escapology
- How to own a shadow : : the chase for Knuth
- Murder in Ely
- Price of duty
- Price of duty
- Price of duty
- Price of duty
- Rogue code
- Rogue code
- Rogue code : a novel
- Sherlock Holmes and Frankenstein's diary
- Skinner
- Skinner
- Stealing the network : how to own an identity
- Stealing the network : the complete series collector's edition
- Stephen Coonts' Deep black : dark zone
- Stephen Coonts' Deep black : jihad
- Stephen Coonts' Deep black : payback
- Stephen Coonts' Deep black, Dark zone
- Stephen Coonts' Deep black, Jihad
- Stephen Coonts' Deep black, Jihad
- Stephen Coonts' Deep black, Payback
- Stephen Coonts' Deep black--Conspiracy
- Stephen Coonts' Deep black--conspiracy
- Strange flesh
- Terms of use
- The Fox
- The Moscow sleepers
- The Polaris protocol
- The ascendant
- The ascendant
- The ascendant
- The cloud collector
- The eye of minds
- The eye of minds
- The fox
- The fox
- The fox
- The game of lives
- The game of lives
- The good traitor
- The rule of thoughts
- The rule of thoughts
- Threat vector
- Threat vector
- Tom Clancy's Op-Center, Dark zone
- Tom Clancy's Op-Center, Dark zone
- Tom Clancy's Op-Center, Dark zone
- Trojan horse
- Unholy domain : a novel
- Virology
- Zero day
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/wXXpMDedlUg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/wXXpMDedlUg/">Cyberterrorism -- Fiction</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Cyberterrorism -- Fiction
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/wXXpMDedlUg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/wXXpMDedlUg/">Cyberterrorism -- Fiction</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>