LEADER 01974oam 2200601I 450 001 9910790751903321 005 20170821160400.0 010 $a1-138-13480-5 010 $a0-240-82404-0 010 $a1-136-07093-1 010 $a1-136-07094-X 024 7 $a10.4324/9780240824048 035 $a(CKB)2550000001167863 035 $a(EBL)1573318 035 $a(SSID)ssj0001059833 035 $a(PQKBManifestationID)11674151 035 $a(PQKBTitleCode)TC0001059833 035 $a(PQKBWorkID)11085821 035 $a(PQKB)10750503 035 $a(MiAaPQ)EBC1573318 035 $a(OCoLC)864899935 035 $a(CaSebORM)9780240823775 035 $a(EXLCZ)992550000001167863 100 $a20180706d2014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHow to manage your agent $ea writer's guide to Hollywood representation /$fChad Gervich 205 $a1st edition 210 1$aBurlington, Mass. :$cFocal Press,$d2014. 215 $a1 online resource (847 p.) 300 $aDescription based upon print version of record. 311 $a0-240-82377-X 311 $a1-306-17481-3 320 $aIncludes bibliographical references and index. 327 $apart I. Represent! -- part II. Television agents -- part III. Feature agents -- part IV. Digital media -- part V. You and your agent -- part VI. Appendices. 330 $aFirst published in 2013. Routledge is an imprint of Taylor & Francis, an informa company. 606 $aMotion picture authorship 606 $aTelevision authorship 615 0$aMotion picture authorship. 615 0$aTelevision authorship. 676 $a791.4502/32 686 $aPER004000$2bisacsh 700 $aGervich$b Chad.$01582035 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790751903321 996 $aHow to manage your agent$93864011 997 $aUNINA LEADER 02390nam 2200625 450 001 9910164930703321 005 20240214223409.0 010 $a0-19-068654-5 010 $a0-19-069469-6 035 $a(CKB)3710000001064425 035 $a(StDuBDS)EDZ0001679759 035 $a(MiAaPQ)EBC4806712 035 $a(PPN)203705807 035 $a(EXLCZ)993710000001064425 100 $a20170509d2016 fy| 0 101 0 $aeng 135 $aur||||||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe cybersecurity dilemma $ehacking, trust, and fear between nations /$fBen Buchanan 210 1$aOxford :$cOxford University Press,$d2016. 215 $a1 online resource (viii, 290 p.) 311 $a0-19-066501-7 320 $aIncludes bibliographical references and index. 330 8 $aWhy do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This text draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. 606 $aCyber intelligence (Computer security) 606 $aCyberterrorism$xPrevention 606 $aNational security$xTechnological innovations 606 $aInternet$xSecurity measures 606 $aInternet$9eng$2eurovoc 606 $acomputer crime$9eng$2eurovoc 606 $ainnovation$9eng$2eurovoc 606 $aartificial intelligence$9eng$2eurovoc 606 $acomputer piracy$9eng$2eurovoc 606 $afight against crime$9eng$2eurovoc 615 0$aCyber intelligence (Computer security) 615 0$aCyberterrorism$xPrevention. 615 0$aNational security$xTechnological innovations. 615 0$aInternet$xSecurity measures. 615 7$aInternet 615 7$acomputer crime 615 7$ainnovation 615 7$aartificial intelligence 615 7$acomputer piracy 615 7$afight against crime 676 $a005.8 686 $a32.24.56$2EP-CLASS 700 $aBuchanan$b Ben$01222753 801 0$bStDuBDS 801 1$bStDuBDS 906 $aBOOK 912 $a9910164930703321 996 $aThe cybersecurity dilemma$92836490 997 $aUNINA