{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB13593959.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB13593959#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB13593959.json"},"dc:title":[{"@value":"How to disappear : erase your digital footprint, leave false trails, and vanish without a trace"}],"dc:creator":"Frank M. Ahearn and Eileen C. Horan","dc:publisher":[{"@value":"Lyons Press"}],"dcterms:extent":"204 p.","cinii:size":"20 cm","dc:language":"eng","dc:date":"2010","cinii:ncid":"BB13593959","cinii:ownerCount":"1","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA17826967#entity","@type":"foaf:Person","foaf:name":[{"@value":"Ahearn, Frank M."}]},{"@id":"https://ci.nii.ac.jp/author/DA17826978#entity","@type":"foaf:Person","foaf:name":[{"@value":"Horan, Eileen C."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001007","@type":"foaf:Organization","foaf:name":"北海道大学 附属図書館","rdfs:seeAlso":{"@id":"https://opac.lib.hokudai.ac.jp/opac/opac_openurl/?ncid=BB13593959"}}],"bibo:lccn":["2010030345"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2010030345"}],"prism:publicationDate":["c2010"],"cinii:note":["Includes index"],"dc:subject":["LCC:BF575.S35","DC22:613.6"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Security+%28Psychology%29","dc:title":"Security (Psychology)"},{"@id":"https://ci.nii.ac.jp/books/search?q=Security+systems","dc:title":"Security systems"},{"@id":"https://ci.nii.ac.jp/books/search?q=Surveillance+detection","dc:title":"Surveillance detection"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781599219776"}]}]}