Guest User

Untitled

a guest
Apr 24th, 2018
459
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
JSON 32.78 KB | None | 0 0
  1. {
  2.  "kind": "books#volumes",
  3.  "totalItems": 552,
  4.  "items": [
  5.   {
  6.    "kind": "books#volume",
  7.    "id": "deF3C_VOq9MC",
  8.    "etag": "Q4xPurRc0QM",
  9.    "selfLink": "https://www.googleapis.com/books/v1/volumes/deF3C_VOq9MC",
  10.    "volumeInfo": {
  11.     "title": "Hacker",
  12.     "subtitle": "",
  13.     "authors": [
  14.      "Alex Kropp"
  15.     ],
  16.     "publisher": "High Interest Publishing Inc.",
  17.     "publishedDate": "2005-04",
  18.     "description": "Computer crime hits a high school, and the prime suspect is a teacher. Hacker and Cole have to find who's behind the mess before the football team breaks them in two.",
  19.     "industryIdentifiers": [
  20.      {
  21.       "type": "ISBN_10",
  22.       "identifier": "1897039093"
  23.      },
  24.      {
  25.       "type": "ISBN_13",
  26.       "identifier": "9781897039090"
  27.      }
  28.     ],
  29.     "readingModes": {
  30.      "text": false,
  31.      "image": true
  32.     },
  33.     "pageCount": 93,
  34.     "printType": "BOOK",
  35.     "categories": [
  36.      "Computer crimes"
  37.     ],
  38.     "maturityRating": "NOT_MATURE",
  39.     "allowAnonLogging": false,
  40.     "contentVersion": "0.1.1.0.preview.1",
  41.     "panelizationSummary": {
  42.      "containsEpubBubbles": false,
  43.      "containsImageBubbles": false
  44.     },
  45.     "imageLinks": {
  46.      "smallThumbnail": "http://books.google.com/books/content?id=deF3C_VOq9MC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
  47.      "thumbnail": "http://books.google.com/books/content?id=deF3C_VOq9MC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
  48.     },
  49.     "language": "en",
  50.     "previewLink": "http://books.google.no/books?id=deF3C_VOq9MC&printsec=frontcover&dq=Hacker&hl=&cd=1&source=gbs_api",
  51.     "infoLink": "http://books.google.no/books?id=deF3C_VOq9MC&dq=Hacker&hl=&source=gbs_api",
  52.     "canonicalVolumeLink": "https://books.google.com/books/about/Hacker.html?hl=&id=deF3C_VOq9MC"
  53.    },
  54.    "saleInfo": {
  55.     "country": "NO",
  56.     "saleability": "NOT_FOR_SALE",
  57.     "isEbook": false
  58.    },
  59.    "accessInfo": {
  60.     "country": "NO",
  61.     "viewability": "PARTIAL",
  62.     "embeddable": true,
  63.     "publicDomain": false,
  64.     "textToSpeechPermission": "ALLOWED",
  65.     "epub": {
  66.      "isAvailable": false
  67.     },
  68.     "pdf": {
  69.      "isAvailable": false
  70.     },
  71.     "webReaderLink": "http://play.google.com/books/reader?id=deF3C_VOq9MC&hl=&printsec=frontcover&source=gbs_api",
  72.     "accessViewStatus": "SAMPLE",
  73.     "quoteSharingAllowed": false
  74.    },
  75.    "searchInfo": {
  76.     "textSnippet": "Computer crime hits a high school, and the prime suspect is a teacher. Hacker and Cole have to find who's behind the mess before the football team breaks them in two."
  77.    }
  78.   },
  79.   {
  80.    "kind": "books#volume",
  81.    "id": "uaOaDgAAQBAJ",
  82.    "etag": "BspS7QDMNaQ",
  83.    "selfLink": "https://www.googleapis.com/books/v1/volumes/uaOaDgAAQBAJ",
  84.    "volumeInfo": {
  85.     "title": "Hacking the Hacker",
  86.     "subtitle": "Learn From the Experts Who Take Down Hackers",
  87.     "authors": [
  88.      "Roger A. Grimes"
  89.     ],
  90.     "publisher": "John Wiley & Sons",
  91.     "publishedDate": "2017-05",
  92.     "description": "Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Learn how hackers do what they do—no technical expertise necessary Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.",
  93.     "industryIdentifiers": [
  94.      {
  95.       "type": "ISBN_13",
  96.       "identifier": "9781119396215"
  97.      },
  98.      {
  99.       "type": "ISBN_10",
  100.       "identifier": "1119396212"
  101.      }
  102.     ],
  103.     "readingModes": {
  104.      "text": false,
  105.      "image": true
  106.     },
  107.     "pageCount": 320,
  108.     "printType": "BOOK",
  109.     "categories": [
  110.      "Computers"
  111.     ],
  112.     "maturityRating": "NOT_MATURE",
  113.     "allowAnonLogging": false,
  114.     "contentVersion": "1.2.1.0.preview.1",
  115.     "panelizationSummary": {
  116.      "containsEpubBubbles": false,
  117.      "containsImageBubbles": false
  118.     },
  119.     "imageLinks": {
  120.      "smallThumbnail": "http://books.google.com/books/content?id=uaOaDgAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
  121.      "thumbnail": "http://books.google.com/books/content?id=uaOaDgAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
  122.     },
  123.     "language": "en",
  124.     "previewLink": "http://books.google.no/books?id=uaOaDgAAQBAJ&printsec=frontcover&dq=Hacker&hl=&cd=2&source=gbs_api",
  125.     "infoLink": "http://books.google.no/books?id=uaOaDgAAQBAJ&dq=Hacker&hl=&source=gbs_api",
  126.     "canonicalVolumeLink": "https://books.google.com/books/about/Hacking_the_Hacker.html?hl=&id=uaOaDgAAQBAJ"
  127.    },
  128.    "saleInfo": {
  129.     "country": "NO",
  130.     "saleability": "NOT_FOR_SALE",
  131.     "isEbook": false
  132.    },
  133.    "accessInfo": {
  134.     "country": "NO",
  135.     "viewability": "PARTIAL",
  136.     "embeddable": true,
  137.     "publicDomain": false,
  138.     "textToSpeechPermission": "ALLOWED",
  139.     "epub": {
  140.      "isAvailable": false
  141.     },
  142.     "pdf": {
  143.      "isAvailable": false
  144.     },
  145.     "webReaderLink": "http://play.google.com/books/reader?id=uaOaDgAAQBAJ&hl=&printsec=frontcover&source=gbs_api",
  146.     "accessViewStatus": "SAMPLE",
  147.     "quoteSharingAllowed": false
  148.    },
  149.    "searchInfo": {
  150.     "textSnippet": "Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure."
  151.    }
  152.   },
  153.   {
  154.    "kind": "books#volume",
  155.    "id": "heXXIm2kgvQC",
  156.    "etag": "ODR09VL0kWE",
  157.    "selfLink": "https://www.googleapis.com/books/v1/volumes/heXXIm2kgvQC",
  158.    "volumeInfo": {
  159.     "title": "Hacker",
  160.     "authors": [
  161.      "Lee Martin"
  162.     ],
  163.     "publisher": "Harlequin Books",
  164.     "publishedDate": "1993-12",
  165.     "description": "Overburdened Fort Worth police detective Deb Ralston finds her work load dramatically increased by a brutal ax murderer with a penchant for hacking computers and their users to death. Reprint. AB. PW.",
  166.     "industryIdentifiers": [
  167.      {
  168.       "type": "ISBN_10",
  169.       "identifier": "0373261357"
  170.      },
  171.      {
  172.       "type": "ISBN_13",
  173.       "identifier": "9780373261352"
  174.      }
  175.     ],
  176.     "readingModes": {
  177.      "text": false,
  178.      "image": false
  179.     },
  180.     "pageCount": 250,
  181.     "printType": "BOOK",
  182.     "categories": [
  183.      "Fiction"
  184.     ],
  185.     "averageRating": 5.0,
  186.     "ratingsCount": 1,
  187.     "maturityRating": "NOT_MATURE",
  188.     "allowAnonLogging": false,
  189.     "contentVersion": "preview-1.0.0",
  190.     "imageLinks": {
  191.      "smallThumbnail": "http://books.google.com/books/content?id=heXXIm2kgvQC&printsec=frontcover&img=1&zoom=5&source=gbs_api",
  192.      "thumbnail": "http://books.google.com/books/content?id=heXXIm2kgvQC&printsec=frontcover&img=1&zoom=1&source=gbs_api"
  193.     },
  194.     "language": "en",
  195.     "previewLink": "http://books.google.no/books?id=heXXIm2kgvQC&q=Hacker&dq=Hacker&hl=&cd=3&source=gbs_api",
  196.     "infoLink": "http://books.google.no/books?id=heXXIm2kgvQC&dq=Hacker&hl=&source=gbs_api",
  197.     "canonicalVolumeLink": "https://books.google.com/books/about/Hacker.html?hl=&id=heXXIm2kgvQC"
  198.    },
  199.    "saleInfo": {
  200.     "country": "NO",
  201.     "saleability": "NOT_FOR_SALE",
  202.     "isEbook": false
  203.    },
  204.    "accessInfo": {
  205.     "country": "NO",
  206.     "viewability": "NO_PAGES",
  207.     "embeddable": false,
  208.     "publicDomain": false,
  209.     "textToSpeechPermission": "ALLOWED",
  210.     "epub": {
  211.      "isAvailable": false
  212.     },
  213.     "pdf": {
  214.      "isAvailable": false
  215.     },
  216.     "webReaderLink": "http://play.google.com/books/reader?id=heXXIm2kgvQC&hl=&printsec=frontcover&source=gbs_api",
  217.     "accessViewStatus": "NONE",
  218.     "quoteSharingAllowed": false
  219.    },
  220.    "searchInfo": {
  221.     "textSnippet": "Overburdened Fort Worth police detective Deb Ralston finds her work load dramatically increased by a brutal ax murderer with a penchant for hacking computers and their users to death. Reprint. AB. PW."
  222.    }
  223.   },
  224.   {
  225.    "kind": "books#volume",
  226.    "id": "g80P_4v4QbIC",
  227.    "etag": "ttMt8ergkRA",
  228.    "selfLink": "https://www.googleapis.com/books/v1/volumes/g80P_4v4QbIC",
  229.    "volumeInfo": {
  230.     "title": "The New Hacker's Dictionary",
  231.     "authors": [
  232.      "Eric S. Raymond"
  233.     ],
  234.     "publisher": "MIT Press",
  235.     "publishedDate": "1996",
  236.     "description": "A listing of computer-buff slang is embellished by the myths, legends, and heroes of a hacker culture",
  237.     "industryIdentifiers": [
  238.      {
  239.       "type": "ISBN_10",
  240.       "identifier": "0262680920"
  241.      },
  242.      {
  243.       "type": "ISBN_13",
  244.       "identifier": "9780262680929"
  245.      }
  246.     ],
  247.     "readingModes": {
  248.      "text": false,
  249.      "image": true
  250.     },
  251.     "pageCount": 547,
  252.     "printType": "BOOK",
  253.     "categories": [
  254.      "Computers"
  255.     ],
  256.     "averageRating": 4.5,
  257.     "ratingsCount": 3,
  258.     "maturityRating": "NOT_MATURE",
  259.     "allowAnonLogging": false,
  260.     "contentVersion": "1.0.1.0.preview.1",
  261.     "imageLinks": {
  262.      "smallThumbnail": "http://books.google.com/books/content?id=g80P_4v4QbIC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
  263.      "thumbnail": "http://books.google.com/books/content?id=g80P_4v4QbIC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
  264.     },
  265.     "language": "en",
  266.     "previewLink": "http://books.google.no/books?id=g80P_4v4QbIC&printsec=frontcover&dq=Hacker&hl=&cd=4&source=gbs_api",
  267.     "infoLink": "http://books.google.no/books?id=g80P_4v4QbIC&dq=Hacker&hl=&source=gbs_api",
  268.     "canonicalVolumeLink": "https://books.google.com/books/about/The_New_Hacker_s_Dictionary.html?hl=&id=g80P_4v4QbIC"
  269.    },
  270.    "saleInfo": {
  271.     "country": "NO",
  272.     "saleability": "NOT_FOR_SALE",
  273.     "isEbook": false
  274.    },
  275.    "accessInfo": {
  276.     "country": "NO",
  277.     "viewability": "PARTIAL",
  278.     "embeddable": true,
  279.     "publicDomain": false,
  280.     "textToSpeechPermission": "ALLOWED",
  281.     "epub": {
  282.      "isAvailable": false
  283.     },
  284.     "pdf": {
  285.      "isAvailable": false
  286.     },
  287.     "webReaderLink": "http://play.google.com/books/reader?id=g80P_4v4QbIC&hl=&printsec=frontcover&source=gbs_api",
  288.     "accessViewStatus": "SAMPLE",
  289.     "quoteSharingAllowed": false
  290.    },
  291.    "searchInfo": {
  292.     "textSnippet": "A listing of computer-buff slang is embellished by the myths, legends, and heroes of a hacker culture"
  293.    }
  294.   },
  295.   {
  296.    "kind": "books#volume",
  297.    "id": "FH_OCgAAQBAJ",
  298.    "etag": "l3cAVd638jQ",
  299.    "selfLink": "https://www.googleapis.com/books/v1/volumes/FH_OCgAAQBAJ",
  300.    "volumeInfo": {
  301.     "title": "Hacker & Moore's Essentials of Obstetrics and Gynecology",
  302.     "authors": [
  303.      "Neville F. Hacker",
  304.      "Joseph C. Gambone",
  305.      "Calvin J. Hobel"
  306.     ],
  307.     "publisher": "Elsevier Health Sciences",
  308.     "publishedDate": "2015-10-25",
  309.     "description": "Hacker & Moore's Essentials of Obstetrics and Gynecology, by Drs. Neville F. Hacker, Joseph C. Gambone, and Calvin J. Hobel, is the #1 choice of ob/gyn residents and medical students because of its concise focus, comprehensive coverage, and easy-to-use format. This new edition features updated clinical cases and assessments, new Clinical Key boxes, and thoroughly revised text and images that reflect today’s best knowledge on the evaluation, diagnosis, and management of a wide range of ob/gyn disorders. Concise, comprehensive content is well organized, highly accessible, and relevant to today’s practice. High-quality, full-color design for maximum readability. New Clinical Key boxes and judicious use of bolding make it easy to identify the high-yield material you need to know. Content is aligned to APGO/CREOG objectives to ensure coverage of essential, clinically relevant material.",
  310.     "industryIdentifiers": [
  311.      {
  312.       "type": "ISBN_13",
  313.       "identifier": "9780323388528"
  314.      },
  315.      {
  316.       "type": "ISBN_10",
  317.       "identifier": "0323388523"
  318.      }
  319.     ],
  320.     "readingModes": {
  321.      "text": true,
  322.      "image": true
  323.     },
  324.     "pageCount": 544,
  325.     "printType": "BOOK",
  326.     "categories": [
  327.      "Medical"
  328.     ],
  329.     "maturityRating": "NOT_MATURE",
  330.     "allowAnonLogging": true,
  331.     "contentVersion": "2.9.9.0.preview.3",
  332.     "panelizationSummary": {
  333.      "containsEpubBubbles": false,
  334.      "containsImageBubbles": false
  335.     },
  336.     "imageLinks": {
  337.      "smallThumbnail": "http://books.google.com/books/content?id=FH_OCgAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
  338.      "thumbnail": "http://books.google.com/books/content?id=FH_OCgAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
  339.     },
  340.     "language": "en",
  341.     "previewLink": "http://books.google.no/books?id=FH_OCgAAQBAJ&printsec=frontcover&dq=Hacker&hl=&cd=5&source=gbs_api",
  342.     "infoLink": "https://play.google.com/store/books/details?id=FH_OCgAAQBAJ&source=gbs_api",
  343.     "canonicalVolumeLink": "https://market.android.com/details?id=book-FH_OCgAAQBAJ"
  344.    },
  345.    "saleInfo": {
  346.     "country": "NO",
  347.     "saleability": "FOR_SALE",
  348.     "isEbook": true,
  349.     "listPrice": {
  350.      "amount": 561.84,
  351.      "currencyCode": "NOK"
  352.     },
  353.     "retailPrice": {
  354.      "amount": 491.61,
  355.      "currencyCode": "NOK"
  356.     },
  357.     "buyLink": "https://play.google.com/store/books/details?id=FH_OCgAAQBAJ&rdid=book-FH_OCgAAQBAJ&rdot=1&source=gbs_api",
  358.     "offers": [
  359.      {
  360.       "finskyOfferType": 1,
  361.       "listPrice": {
  362.        "amountInMicros": 5.6184E8,
  363.        "currencyCode": "NOK"
  364.       },
  365.       "retailPrice": {
  366.        "amountInMicros": 4.9161E8,
  367.        "currencyCode": "NOK"
  368.       }
  369.      }
  370.     ]
  371.    },
  372.    "accessInfo": {
  373.     "country": "NO",
  374.     "viewability": "PARTIAL",
  375.     "embeddable": true,
  376.     "publicDomain": false,
  377.     "textToSpeechPermission": "ALLOWED",
  378.     "epub": {
  379.      "isAvailable": true,
  380.      "acsTokenLink": "http://books.google.no/books/download/Hacker_Moore_s_Essentials_of_Obstetrics-sample-epub.acsm?id=FH_OCgAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api"
  381.     },
  382.     "pdf": {
  383.      "isAvailable": true,
  384.      "acsTokenLink": "http://books.google.no/books/download/Hacker_Moore_s_Essentials_of_Obstetrics-sample-pdf.acsm?id=FH_OCgAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api"
  385.     },
  386.     "webReaderLink": "http://play.google.com/books/reader?id=FH_OCgAAQBAJ&hl=&printsec=frontcover&source=gbs_api",
  387.     "accessViewStatus": "SAMPLE",
  388.     "quoteSharingAllowed": false
  389.    },
  390.    "searchInfo": {
  391.     "textSnippet": "This new edition features updated clinical cases and assessments, new Clinical Key boxes, and thoroughly revised text and images that reflect today’s best knowledge on the evaluation, diagnosis, and management of a wide range of ob/gyn ..."
  392.    }
  393.   },
  394.   {
  395.    "kind": "books#volume",
  396.    "id": "nvD6rQEACAAJ",
  397.    "etag": "xRo9YM2sWBs",
  398.    "selfLink": "https://www.googleapis.com/books/v1/volumes/nvD6rQEACAAJ",
  399.    "volumeInfo": {
  400.     "title": "Medieval Hackers",
  401.     "authors": [
  402.      "Kathleen Kennedy"
  403.     ],
  404.     "publishedDate": "2015-01-16",
  405.     "description": "... the word [\"hacker\"] itself is quite old. In fact, the earliest record of the noun \"hacker\" is medieval: a type of chopping implement was known as a \"hacker\" from the 1480s. Evidently, over time the term moved from the implement to the person wielding the implement. Today the grammatical slippage remains, as \"the hacker hacked the hack\" is grammatically sound, if stylistically unfortunate. Notably, even in its earliest uses, \"hacker\" and \"hacking\" referred to necessary disruption. Arboriculture required careful pruning (with a hacker) to remove unwanted branches and cultivation necessitated the regular breaking up of soil and weeds in between rows of a crop (with a hacker). Such practices broke limbs and turf in order to create beneficial new growth. Such physical hacking resembles the actions of computer hackers who claim to identify security exploits (breaking into software) in order to improve computer security, not to weaken it. Kathleen E. Kenndy, Medieval Hackers Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous's Fawkes mask to William Tyndale's bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the \"effluorescence of intellectual piracy\" in our current moment of political and technological revolutions \"cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before. ... We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons.\"",
  406.     "industryIdentifiers": [
  407.      {
  408.       "type": "ISBN_10",
  409.       "identifier": "0692352465"
  410.      },
  411.      {
  412.       "type": "ISBN_13",
  413.       "identifier": "9780692352465"
  414.      }
  415.     ],
  416.     "readingModes": {
  417.      "text": false,
  418.      "image": false
  419.     },
  420.     "pageCount": 180,
  421.     "printType": "BOOK",
  422.     "maturityRating": "NOT_MATURE",
  423.     "allowAnonLogging": false,
  424.     "contentVersion": "preview-1.0.0",
  425.     "imageLinks": {
  426.      "smallThumbnail": "http://books.google.com/books/content?id=nvD6rQEACAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api",
  427.      "thumbnail": "http://books.google.com/books/content?id=nvD6rQEACAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api"
  428.     },
  429.     "language": "en",
  430.     "previewLink": "http://books.google.no/books?id=nvD6rQEACAAJ&dq=Hacker&hl=&cd=6&source=gbs_api",
  431.     "infoLink": "http://books.google.no/books?id=nvD6rQEACAAJ&dq=Hacker&hl=&source=gbs_api",
  432.     "canonicalVolumeLink": "https://books.google.com/books/about/Medieval_Hackers.html?hl=&id=nvD6rQEACAAJ"
  433.    },
  434.    "saleInfo": {
  435.     "country": "NO",
  436.     "saleability": "NOT_FOR_SALE",
  437.     "isEbook": false
  438.    },
  439.    "accessInfo": {
  440.     "country": "NO",
  441.     "viewability": "NO_PAGES",
  442.     "embeddable": false,
  443.     "publicDomain": false,
  444.     "textToSpeechPermission": "ALLOWED",
  445.     "epub": {
  446.      "isAvailable": false
  447.     },
  448.     "pdf": {
  449.      "isAvailable": false
  450.     },
  451.     "webReaderLink": "http://play.google.com/books/reader?id=nvD6rQEACAAJ&hl=&printsec=frontcover&source=gbs_api",
  452.     "accessViewStatus": "NONE",
  453.     "quoteSharingAllowed": false
  454.    },
  455.    "searchInfo": {
  456.     "textSnippet": "This is important work in media archaeology, for as Kennedy writes in this book, the "effluorescence of intellectual piracy" in our current moment of political and technological revolutions "cannot help but draw us to look back and see that ..."
  457.    }
  458.   },
  459.   {
  460.    "kind": "books#volume",
  461.    "id": "4VyhQgAACAAJ",
  462.    "etag": "EcQBq3kafUA",
  463.    "selfLink": "https://www.googleapis.com/books/v1/volumes/4VyhQgAACAAJ",
  464.    "volumeInfo": {
  465.     "title": "Hacker Culture",
  466.     "authors": [
  467.      "Douglas Thomas"
  468.     ],
  469.     "publishedDate": "2002",
  470.     "description": "\"Douglas Thomas is associate professor in the Annenberg School for Communication at the University of Southern California.\"--BOOK JACKET.Title Summary field provided by Blackwell North America, Inc. All Rights Reserved",
  471.     "industryIdentifiers": [
  472.      {
  473.       "type": "ISBN_10",
  474.       "identifier": "0816633452"
  475.      },
  476.      {
  477.       "type": "ISBN_13",
  478.       "identifier": "9780816633456"
  479.      }
  480.     ],
  481.     "readingModes": {
  482.      "text": false,
  483.      "image": false
  484.     },
  485.     "pageCount": 266,
  486.     "printType": "BOOK",
  487.     "categories": [
  488.      "Computers"
  489.     ],
  490.     "maturityRating": "NOT_MATURE",
  491.     "allowAnonLogging": false,
  492.     "contentVersion": "preview-1.0.0",
  493.     "imageLinks": {
  494.      "smallThumbnail": "http://books.google.com/books/content?id=4VyhQgAACAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api",
  495.      "thumbnail": "http://books.google.com/books/content?id=4VyhQgAACAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api"
  496.     },
  497.     "language": "en",
  498.     "previewLink": "http://books.google.no/books?id=4VyhQgAACAAJ&dq=Hacker&hl=&cd=7&source=gbs_api",
  499.     "infoLink": "http://books.google.no/books?id=4VyhQgAACAAJ&dq=Hacker&hl=&source=gbs_api",
  500.     "canonicalVolumeLink": "https://books.google.com/books/about/Hacker_Culture.html?hl=&id=4VyhQgAACAAJ"
  501.    },
  502.    "saleInfo": {
  503.     "country": "NO",
  504.     "saleability": "NOT_FOR_SALE",
  505.     "isEbook": false
  506.    },
  507.    "accessInfo": {
  508.     "country": "NO",
  509.     "viewability": "NO_PAGES",
  510.     "embeddable": false,
  511.     "publicDomain": false,
  512.     "textToSpeechPermission": "ALLOWED",
  513.     "epub": {
  514.      "isAvailable": false
  515.     },
  516.     "pdf": {
  517.      "isAvailable": false
  518.     },
  519.     "webReaderLink": "http://play.google.com/books/reader?id=4VyhQgAACAAJ&hl=&printsec=frontcover&source=gbs_api",
  520.     "accessViewStatus": "NONE",
  521.     "quoteSharingAllowed": false
  522.    },
  523.    "searchInfo": {
  524.     "textSnippet": ""Douglas Thomas is associate professor in the Annenberg School for Communication at the University of Southern California."--BOOK JACKET.Title Summary field provided by Blackwell North America, Inc. All Rights Reserved"
  525.    }
  526.   },
  527.   {
  528.    "kind": "books#volume",
  529.    "id": "953ZoAEACAAJ",
  530.    "etag": "pau42yBrzuo",
  531.    "selfLink": "https://www.googleapis.com/books/v1/volumes/953ZoAEACAAJ",
  532.    "volumeInfo": {
  533.     "title": "Hacker",
  534.     "authors": [
  535.      "Ted Dekker"
  536.     ],
  537.     "publishedDate": "2015-01-07",
  538.     "description": "\"My name is Nyah and I'm a hacker. I know things most people would never believe. Things that shouldn't exist, but do.\"",
  539.     "industryIdentifiers": [
  540.      {
  541.       "type": "ISBN_10",
  542.       "identifier": "1410469379"
  543.      },
  544.      {
  545.       "type": "ISBN_13",
  546.       "identifier": "9781410469373"
  547.      }
  548.     ],
  549.     "readingModes": {
  550.      "text": false,
  551.      "image": false
  552.     },
  553.     "pageCount": 393,
  554.     "printType": "BOOK",
  555.     "categories": [
  556.      "Fiction"
  557.     ],
  558.     "maturityRating": "NOT_MATURE",
  559.     "allowAnonLogging": false,
  560.     "contentVersion": "preview-1.0.0",
  561.     "imageLinks": {
  562.      "smallThumbnail": "http://books.google.com/books/content?id=953ZoAEACAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api",
  563.      "thumbnail": "http://books.google.com/books/content?id=953ZoAEACAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api"
  564.     },
  565.     "language": "en",
  566.     "previewLink": "http://books.google.no/books?id=953ZoAEACAAJ&dq=Hacker&hl=&cd=8&source=gbs_api",
  567.     "infoLink": "http://books.google.no/books?id=953ZoAEACAAJ&dq=Hacker&hl=&source=gbs_api",
  568.     "canonicalVolumeLink": "https://books.google.com/books/about/Hacker.html?hl=&id=953ZoAEACAAJ"
  569.    },
  570.    "saleInfo": {
  571.     "country": "NO",
  572.     "saleability": "NOT_FOR_SALE",
  573.     "isEbook": false
  574.    },
  575.    "accessInfo": {
  576.     "country": "NO",
  577.     "viewability": "NO_PAGES",
  578.     "embeddable": false,
  579.     "publicDomain": false,
  580.     "textToSpeechPermission": "ALLOWED",
  581.     "epub": {
  582.      "isAvailable": false
  583.     },
  584.     "pdf": {
  585.      "isAvailable": false
  586.     },
  587.     "webReaderLink": "http://play.google.com/books/reader?id=953ZoAEACAAJ&hl=&printsec=frontcover&source=gbs_api",
  588.     "accessViewStatus": "NONE",
  589.     "quoteSharingAllowed": false
  590.    },
  591.    "searchInfo": {
  592.     "textSnippet": "Seventeen-year-old genius hacker Nyah Parks makes a living by hacking into the systems of major corporations, but when an important job goes wrong, she is forced to perform one last dangerous hack to save herself."
  593.    }
  594.   },
  595.   {
  596.    "kind": "books#volume",
  597.    "id": "v3gpDwAAQBAJ",
  598.    "etag": "d97GhFJGEdM",
  599.    "selfLink": "https://www.googleapis.com/books/v1/volumes/v3gpDwAAQBAJ",
  600.    "volumeInfo": {
  601.     "title": "Hacking",
  602.     "subtitle": "Be a Hacker with Ethics",
  603.     "authors": [
  604.      "Harsh Bothra"
  605.     ],
  606.     "publisher": "KHANNA PUBLISHING",
  607.     "publishedDate": "2017-06-24",
  608.     "description": "Be a Hacker with Ethics",
  609.     "industryIdentifiers": [
  610.      {
  611.       "type": "ISBN_13",
  612.       "identifier": "9789386173058"
  613.      },
  614.      {
  615.       "type": "ISBN_10",
  616.       "identifier": "9386173050"
  617.      }
  618.     ],
  619.     "readingModes": {
  620.      "text": false,
  621.      "image": true
  622.     },
  623.     "pageCount": 216,
  624.     "printType": "BOOK",
  625.     "categories": [
  626.      "Computers"
  627.     ],
  628.     "maturityRating": "NOT_MATURE",
  629.     "allowAnonLogging": true,
  630.     "contentVersion": "preview-1.0.0",
  631.     "panelizationSummary": {
  632.      "containsEpubBubbles": false,
  633.      "containsImageBubbles": false
  634.     },
  635.     "imageLinks": {
  636.      "smallThumbnail": "http://books.google.com/books/content?id=v3gpDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
  637.      "thumbnail": "http://books.google.com/books/content?id=v3gpDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
  638.     },
  639.     "language": "en",
  640.     "previewLink": "http://books.google.no/books?id=v3gpDwAAQBAJ&printsec=frontcover&dq=Hacker&hl=&cd=9&source=gbs_api",
  641.     "infoLink": "https://play.google.com/store/books/details?id=v3gpDwAAQBAJ&source=gbs_api",
  642.     "canonicalVolumeLink": "https://market.android.com/details?id=book-v3gpDwAAQBAJ"
  643.    },
  644.    "saleInfo": {
  645.     "country": "NO",
  646.     "saleability": "FOR_SALE",
  647.     "isEbook": true,
  648.     "listPrice": {
  649.      "amount": 40.64,
  650.      "currencyCode": "NOK"
  651.     },
  652.     "retailPrice": {
  653.      "amount": 35.56,
  654.      "currencyCode": "NOK"
  655.     },
  656.     "buyLink": "https://play.google.com/store/books/details?id=v3gpDwAAQBAJ&rdid=book-v3gpDwAAQBAJ&rdot=1&source=gbs_api",
  657.     "offers": [
  658.      {
  659.       "finskyOfferType": 1,
  660.       "listPrice": {
  661.        "amountInMicros": 4.064E7,
  662.        "currencyCode": "NOK"
  663.       },
  664.       "retailPrice": {
  665.        "amountInMicros": 3.556E7,
  666.        "currencyCode": "NOK"
  667.       }
  668.      }
  669.     ]
  670.    },
  671.    "accessInfo": {
  672.     "country": "NO",
  673.     "viewability": "PARTIAL",
  674.     "embeddable": true,
  675.     "publicDomain": false,
  676.     "textToSpeechPermission": "ALLOWED",
  677.     "epub": {
  678.      "isAvailable": false
  679.     },
  680.     "pdf": {
  681.      "isAvailable": true,
  682.      "acsTokenLink": "http://books.google.no/books/download/Hacking-sample-pdf.acsm?id=v3gpDwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api"
  683.     },
  684.     "webReaderLink": "http://play.google.com/books/reader?id=v3gpDwAAQBAJ&hl=&printsec=frontcover&source=gbs_api",
  685.     "accessViewStatus": "SAMPLE",
  686.     "quoteSharingAllowed": false
  687.    },
  688.    "searchInfo": {
  689.     "textSnippet": "Be a Hacker with Ethics"
  690.    }
  691.   },
  692.   {
  693.    "kind": "books#volume",
  694.    "id": "pwqCCgAAQBAJ",
  695.    "etag": "4z7uagphOgU",
  696.    "selfLink": "https://www.googleapis.com/books/v1/volumes/pwqCCgAAQBAJ",
  697.    "volumeInfo": {
  698.     "title": "Hacker (A gripping mystery romance)",
  699.     "subtitle": "",
  700.     "authors": [
  701.      "Claire Chilton"
  702.     ],
  703.     "publisher": "Ragz Books",
  704.     "publishedDate": "2015-09-06",
  705.     "description": "\"Pulse-racing mystery romance that keeps you turning the page!\" RULE#2: DON’T GET LOCKED IN HIS DEADLY EMBRACE.... Lara Grayson is an unemployed hacktivist living on the shitty side of town, but she has a dream. She wants to work for the tech company Kinder Corp and marry the boss, Jack Kinder. However, her rent is overdue, and the only job opportunity for a girl like her is stacking shelves at the local seven eleven. When she hacks a senator’s website and receives an invitation to enter the Kinder Awards, she thinks her luck has finally changed, but first she has to kick the world’s best hackers out of the competition. There’s just one snag. She can’t think straight when she’s around the sexy British hacker Jimmy Carroll, who is her toughest competitor for the prize… A must read for fans of Janet Evanovich or Nora Roberts What people are saying about this series \"Sparks fly as the feisty female protagonist is pitted against the hero in a fun romantic suspense that you can't stop reading.\" \"A gripping mystery romance set in a dark criminal world that is brimming with betrayal and action packed intrigue.\" \"This unforgettable story is a new adult organized crime adventure and romantic comedy, all rolled into one delightfully thrilling read.\" \"The heated clash between the urban heroine and her nemesis in an amateur dating heist, light up this dark thriller with cozy humor and characters that you can't help falling in love with.\"",
  706.     "industryIdentifiers": [
  707.      {
  708.       "type": "ISBN_13",
  709.       "identifier": "9781908822116"
  710.      },
  711.      {
  712.       "type": "ISBN_10",
  713.       "identifier": "1908822112"
  714.      }
  715.     ],
  716.     "readingModes": {
  717.      "text": true,
  718.      "image": false
  719.     },
  720.     "pageCount": 278,
  721.     "printType": "BOOK",
  722.     "categories": [
  723.      "Fiction"
  724.     ],
  725.     "maturityRating": "NOT_MATURE",
  726.     "allowAnonLogging": true,
  727.     "contentVersion": "1.11.13.0.preview.2",
  728.     "panelizationSummary": {
  729.      "containsEpubBubbles": false,
  730.      "containsImageBubbles": false
  731.     },
  732.     "imageLinks": {
  733.      "smallThumbnail": "http://books.google.com/books/content?id=pwqCCgAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
  734.      "thumbnail": "http://books.google.com/books/content?id=pwqCCgAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
  735.     },
  736.     "language": "en",
  737.     "previewLink": "http://books.google.no/books?id=pwqCCgAAQBAJ&printsec=frontcover&dq=Hacker&hl=&cd=10&source=gbs_api",
  738.     "infoLink": "https://play.google.com/store/books/details?id=pwqCCgAAQBAJ&source=gbs_api",
  739.     "canonicalVolumeLink": "https://market.android.com/details?id=book-pwqCCgAAQBAJ"
  740.    },
  741.    "saleInfo": {
  742.     "country": "NO",
  743.     "saleability": "FOR_SALE",
  744.     "isEbook": true,
  745.     "listPrice": {
  746.      "amount": 30.59,
  747.      "currencyCode": "NOK"
  748.     },
  749.     "retailPrice": {
  750.      "amount": 26.77,
  751.      "currencyCode": "NOK"
  752.     },
  753.     "buyLink": "https://play.google.com/store/books/details?id=pwqCCgAAQBAJ&rdid=book-pwqCCgAAQBAJ&rdot=1&source=gbs_api",
  754.     "offers": [
  755.      {
  756.       "finskyOfferType": 1,
  757.       "listPrice": {
  758.        "amountInMicros": 3.059E7,
  759.        "currencyCode": "NOK"
  760.       },
  761.       "retailPrice": {
  762.        "amountInMicros": 2.677E7,
  763.        "currencyCode": "NOK"
  764.       }
  765.      }
  766.     ]
  767.    },
  768.    "accessInfo": {
  769.     "country": "NO",
  770.     "viewability": "PARTIAL",
  771.     "embeddable": true,
  772.     "publicDomain": false,
  773.     "textToSpeechPermission": "ALLOWED",
  774.     "epub": {
  775.      "isAvailable": true
  776.     },
  777.     "pdf": {
  778.      "isAvailable": false
  779.     },
  780.     "webReaderLink": "http://play.google.com/books/reader?id=pwqCCgAAQBAJ&hl=&printsec=frontcover&source=gbs_api",
  781.     "accessViewStatus": "SAMPLE",
  782.     "quoteSharingAllowed": false
  783.    },
  784.    "searchInfo": {
  785.     "textSnippet": "She can’t think straight when she’s around the sexy British hacker Jimmy Carroll, who is her toughest competitor for the prize… A must read for fans of Janet Evanovich or Nora Roberts What people are saying about this series "Sparks ..."
  786.    }
  787.   }
  788.  ]
  789. }
Advertisement
Add Comment
Please, Sign In to add comment