{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BA5366734X.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BA5366734X#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BA5366734X.json"},"dc:title":[{"@value":"Hacking cyberspace"}],"dc:creator":"David J. Gunkel","dc:publisher":[{"@value":"Westview Press"}],"dcterms:extent":"x, 239 p.","cinii:size":"23 cm","dc:language":"eng","dc:date":"2001","cinii:ncid":"BA5366734X","cinii:ownerCount":"5","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Gunkel, David J."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001641","@type":"foaf:Organization","foaf:name":"筑波大学 附属図書館 図書館情報学図書館","rdfs:seeAlso":{"@id":"https://www.tulips.tsukuba.ac.jp/mylimedio/search/search.do?target=local&mode=comp&ncid=BA5366734X"}},{"@id":"https://ci.nii.ac.jp/library/FA004297","@type":"foaf:Organization","foaf:name":"北星学園大学 図書館","rdfs:seeAlso":{"@id":"http://opac.hokusei.ac.jp/mylimedio/search/search.do?target=local&mode=comp&category-mgz=1&category-book=1&annex=all&ncid=BA5366734X"}},{"@id":"https://ci.nii.ac.jp/library/FA007739","@type":"foaf:Organization","foaf:name":"立命館大学 図書館","rdfs:seeAlso":{"@id":"http://runners.ritsumei.ac.jp/opac/opac_openurl/?ncid=BA5366734X"}},{"@id":"https://ci.nii.ac.jp/library/FA007954","@type":"foaf:Organization","foaf:name":"追手門学院大学 附属図書館","rdfs:seeAlso":{"@id":"https://lib-opac.otemon.ac.jp/opac/opac_openurl/?ncid=BA5366734X"}},{"@id":"https://ci.nii.ac.jp/library/FA008108","@type":"foaf:Organization","foaf:name":"相愛大学図書館","rdfs:seeAlso":{"@id":"http://opac.soai.ac.jp/Main/OpenSearch.aspx?ncid=BA5366734X"}}],"bibo:lccn":["00053180"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/00053180"}],"prism:publicationDate":["c2001"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["LCC:QA76.9.A25","DC21:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+hackers","dc:title":"Computer hackers"},{"@id":"https://ci.nii.ac.jp/books/search?q=System+programming+%28Computer+science%29","dc:title":"System programming (Computer science)"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA23053848#entity","dc:title":"Polemics series","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:0813336694"}]}]}