000 -LEADER |
fixed length control field |
01782cam a2200397Ia 4500 |
CONTROL NUMBER |
control field |
639167401 |
CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
DATE AND TIME OF LATEST TRANSACTION |
control field |
20110708153352.0 |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100607s2011 nyua j 000 1 eng d |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780545165013 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0545165016 |
SYSTEM CONTROL NUMBER |
System control number |
(Sirsi) 511719 |
CATALOGING SOURCE |
Original cataloging agency |
BTCTA |
Language of cataloging |
eng |
Transcribing agency |
BTCTA |
Modifying agency |
CPL |
-- |
VP@ |
-- |
NOG |
LOCAL HOLDINGS (OCLC) |
Holding library |
NOGA |
LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
PZ7.C21694 |
Item number |
Sha 2011 |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
[Fic] |
Edition number |
22 |
AUTHOR NAME |
AUTHOR NAME |
Carman, Patrick. |
TITLE STATEMENT |
Title |
Shantorian / |
Statement of responsibility, etc |
Patrick Carman. |
EDITION STATEMENT |
Edition statement |
1st ed. |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
Scholastic, |
Date of publication, distribution, etc |
c2011. |
PHYSICAL DESCRIPTION |
Extent |
169 p. : |
Other physical details |
ill. ; |
Dimensions |
22 cm. |
SERIES STATEMENT |
Series statement |
Trackers. |
GENERAL NOTE |
General note |
Continues the adventures of four tech-savvy kids, Adam, Finn, Lewis, and Emily, as they dig deeper into the world of online crime in a high-tech, high-stakes game of cat and mouse with Shantorian, the world's most dangerous hacker. Includes a URL and passwords for a related website where readers can decipher plot-related puzzles and watch videos that further develop the story. |
SUMMARY, ETC. |
Summary, etc |
Using sophisticated technology and impressive coding skills to track down advanced cyber criminals, four savvy teens close in on a dangerous hacker before realizing that they are being led into a trap, in a story told through a collage of video segments, text, and website postings. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer hackers |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Criminal investigation |
ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
02. English Fiction |
LOCAL PROCESSING INFORMATION (OCLC) |
d |
F CAR |
c |
221 |