Explore: Computer Security In Fiction
Discover books, insights, and more — all in one place.
Learn more about Computer Security In Fiction with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computer-security-in-fiction”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Digital Fortress
By Dan Brown

“Digital Fortress” Metadata:
- Title: Digital Fortress
- Author: Dan Brown
- Languages: ➤ English - pol - Spanish; Castilian - español, castellano
- Number of Pages: Median: 447
- Publisher: ➤ ACT - labutxaca - Publisher not identified - ALBATROS - Altin Kitaplar - Orion (an Imprint of The Orion Publishing Group Ltd ) - China Times - Thomas Dunne Books - Sextante - Palgrave Macmillan - Bertrand Editora - Albatros/Sonia Draga - Albatros - St. Martin's Press - St. Martin - Altin - JC Lattes - Thomas Dune Books - Oscar Mondadori - Corgi Books - NXB Văn hóa - thông tin - Orion Pub Co - St. Martin's Griffin - Random House Publishing Group - Yayincilik - St. Martins Paperbacks - Griffin - FonoLibro Inc. - Thomas Dunne Books / St. Martin's Griffin - Kadokawa Group Publishing - Kadokawa Shoten - Luitingh - Brand: Books On Tape - Nhà xuất bản Văn hóa - thông tin - Rebound by Sagebrush - St. Martin's Paperbacks - Editora Arqueiro - PLANETA - Booket - Macmillan Audio - Blackstone Audiobooks - Editorial Empúries - Circulo de lectores - الدار العربية للعلوم - Bantam Press - Shi bao wen hua chu ban qi ye gu fen you xian gong si - AST - Ediciones Urano, S.A. - Thorndike Windsor Parragon - Ed. France Loisirs - Odtü - Transworld Publishers Limited - Books on Tape - wydawnictwo albatros - Audio Renaissance - Sonia Draga - Transworld Paperbacks - JC Lattès - Gustav Lübbe Verlag - Arqueiro - Ren min wen xue chu ban she - Taegyo Bet'elsŭman
- Publish Date: ➤ 1998 - 2000 - 2003 - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2013 - 2014 - 2015 - 2016 - 2017 - 2023
- Publish Location: ➤ Amsterdam - São Paulo, SP, Brasil - Milan, Italy - Bei jing - New York - Tōkyō - Moskva - Beijing Shi - Ha Noi - Paris - London, England - Barcelona, España - Hà Nuoi - London - Bath, U.K - Brazil - Warszawa - Waterville, ME - New York, USA - Paris, France - Taibei Shi - Chiado - Sŏul-si
“Digital Fortress” Subjects and Themes:
- Subjects: ➤ techno-thriller - supercomputers - Se curite informatique - Intelligence officers - Cryptographers - Fiction - Computer security - Romans, nouvelles - Officiers de renseignements - Cryptographes - Litterature americaine - Roman americain - Securite informatique - Roman suspens - thrillers - suspense fiction - United States. National Security Agency - United States - Gsafd - Computer security in fiction - Code and cipher stories - Ameriška književnost - Kriminal - Cryptographers in fiction - Umori - Open Library Staff Picks - Varnostne kode - Intelligence officers in fiction - United States. in fiction - Chang pian xiao shuo - Polish language materials - Fiction, thrillers - Fiction, technological - Fiction, espionage - Fiction, thrillers, general - Littérature américaine - Roman américain - Fiction, thrillers, espionage - Fiction, thrillers, technological - collectionid:dbsan
- People: ➤ Susan Fletcher - Ensei Tankado - David Becker - Trevor Strathmore - Phil Chartrukian - Greg Hale - Leland Fontaine - Hulohot - Midge Milken - Chad Brinkerhoff - Jabba - Soshi Kuta - Tokugen Numataka - Peter McCuffin
- Places: ➤ USA - Sevilla - Tokyo - Seville - Spain - United States - Mei guo
- Time: Xian dai .
Edition Identifiers:
- Google Books ID: ➤ 7HUoGQAACAAJ - NMb-A45VAKcC - au-1DQAAQBAJ - Nv_cAAAACAAJ - tM3KwAEACAAJ - QACdjY_ju9kC - mnIrHwAACAAJ
- The Open Library ID: ➤ OL50210239M - OL43676627M - OL43040834M - OL47312651M - OL47338034M - OL35994206M - OL35617919M - OL47131325M - OL47132987M - OL43262358M - OL43514428M - OL39717081M - OL35434225M - OL35596042M - OL37856939M - OL32141786M - OL37755546M - OL36694510M - OL32475366M - OL36689356M - OL35714526M - OL34416780M - OL34431240M - OL24636390M - OL35693409M - OL35693407M - OL35693405M - OL33939060M - OL31990060M - OL31953987M - OL31953989M - OL32757209M - OL26718155M - OL25922882M - OL32365893M - OL31971109M - OL31891317M - OL29166468M - OL29590266M - OL29316222M - OL28974776M - OL29044406M - OL29004598M - OL29157627M - OL28348650M - OL28199915M - OL27995789M - OL28264141M - OL9087214M - OL9110147M - OL26913972M - OL27654319M - OL10602426M - OL9164557M - OL26448801M - OL8913641M - OL8814438M - OL13160011M - OL9148351M - OL7985014M - OL9881152M - OL9572254M - OL13059669M - OL26338108M - OL24196156M - OL686206M - OL23087630M - OL23016092M - OL23063972M - OL21999841M - OL23070524M - OL18264767M - OL3301876M - OL9488480M - OL22613625M - OL22125022M - OL8875044M - OL8875089M - OL9894159M - OL8875116M - OL22076616M - OL23120429M - OL17948330M - OL25285738M
- Online Computer Library Center (OCLC) ID: ➤ 1103454936 - 1149266635 - 830625722 - 946160891 - 749147574 - 761223347 - 1000081464 - 732621139 - 844311468 - 61330824 - 54799267 - 1231684559 - 216941688 - 970544473 - 552086589 - 192078020 - 474149554 - 59181697 - 145873319 - 475786761 - 1245810625 - 53988587 - 61461320 - 66017936 - 556150169 - 803152400 - 910614972 - 799906981 - 47663592 - 75278716 - 655890544 - 910468712 - 858462670 - 881608539
- Library of Congress Control Number (LCCN): 2004041255 - 2006700041 - 2006700040 - 2004041879 - 97033118
- All ISBNs: ➤ 9781409091189 - 9784042955108 - 9780312263126 - 9780552171373 - 1593973594 - 9781429902304 - 9780312180874 - 9788375088496 - 9784047915183 - 7020101542 - 1427214425 - 1417664363 - 0786259795 - 0752868926 - 9780593077993 - 8408176102 - 1593975635 - 0312207158 - 9781250064073 - 9781593973599 - 9788467219142 - 9789875808904 - 031218087X - 9781439565773 - 8489367019 - 9789752112438 - 8580414059 - 9780552151696 - 8497871596 - 4047915173 - 1429902302 - 2744192066 - 0786113723 - 8467219149 - 3404157621 - 8497871588 - 8935077088199 - 9024527910 - 9788804571919 - 073669689X - 9780752868912 - 9780593057445 - 7020048145 - 1250064074 - 9780552159739 - 8499300278 - 125089803X - 0736696954 - 9953299129 - 9782709626309 - 0552169994 - 9780552161251 - 9789722514699 - 9788957591246 - 9722514695 - 0552151696 - 8375081981 - 5170137761 - 055217355X - 9780593055069 - 9782744192067 - 1933499265 - 8957591230 - 9757064831 - 0593055063 - 8804571918 - 8376590278 - 9781593975081 - 0552159735 - 8389779013 - 9780736696890 - 9782253127079 - 9789953299129 - 1593975082 - 9789024553020 - 9788957591222 - 9788375081985 - 9785170137763 - 8599296205 - 9780786259793 - 0593077997 - 0552169986 - 9788497871587 - 9781427214423 - 9788497871594 - 140909118X - 0312995423 - 9783404157624 - 9780312335168 - 9789757064831 - 9875808903 - 4047915181 - 9781409091172 - 4042955118 - 9781593975630 - 9788408176107 - 8375088498 - 9781427271280 - 9788599296202 - 9788499300276 - 9788376590271 - 9780312207151 - 1439565775 - 9789024527915 - 9780752868929 - 9788957591239 - 9781250898036 - 9789752111653 - 841703126X - 9752111653 - 9785170313396 - 404295510X - 9788575421611 - 9788489367012 - 2253127078 - 0312944926 - 957134317X - 9787020101542 - 9781417664368 - 9780552173551 - 9784042955115 - 1427271283 - 8373591729 - 9752112439 - 8957591249 - 9788417031268 - 9784047915176 - 9780786113729 - 9788580414059 - 9788389779014 - 9781933499260 - 8575421611 - 9780552169998 - 0552212431 - 9780736696951 - 055216125X - 9024553024 - 0312263120 - 9780552212434 - 517031339X - 9788373591721 - 9780312995423 - 0312335164 - 1409091171 - 9780312944926 - 9789571343174 - 0552171379 - 0752868918 - 0593057449 - 8957591222 - 9787020048144 - 9780552169981 - 2709626306
First Setence:
"They were in the Smoky Mountains at their favorite bed-and-breakfast."
"They were in the smoky mountains at their favorite bed-and-breakfast."
Author's Alternative Names:
"Dens Brauns", "BROWN DAN", "Danielle Brown", "(mei) Ge, er si man (Brown, Dan)", "دان براون", "Дэн Браун / Dan Brown", "Дэн Браун", "Brown,Dan", "DAN BROWN" and "Dan Brown ( dan bu lang)"Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Digital Fortress at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Wiki
Source: Wikipedia
Wikipedia Results
Search Results from Wikipedia
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security
Security hacker
A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system
Computer virus
self-reproducing program in fiction is in the 1970 short story The Scarred Man by Gregory Benford which describes a computer program called VIRUS which
List of fictional computers
computers or fictional artificial intelligences that have appeared in notable works of fiction. The work may be about the computer, or the computer may
Out of the Inner Circle
Inner Circle: A Hacker's Guide to Computer Security is a book by Bill Landreth and Howard Rheingold, published in 1985 by Microsoft Press and distributed
Computer magazine
Computer magazines are about computers and related subjects, such as networking and the Internet. Most computer magazines offer (or offered) advice, some
The Cuckoo's Egg (book)
into a computer at Lawrence Berkeley National Laboratory (LBNL). Stoll's use of the term extended the metaphor cuckoo's egg from brood parasitism in birds
The Hacker's Handbook
Handbook is a non-fiction book in four editions, each reprinted numerous times between 1985 and 1990, and explaining how phone and computer systems of the
Computer forensics
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital
Computer
Computability theory Computer security Glossary of computer hardware terms History of computer science List of computer term etymologies List of computer system manufacturers