WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/25767974

Ruthless. com

Refusing to put his encryption program on the market, Roger Gordian finds his company the object of a suspicious hostile takeover.

Open All Close All

http://schema.org/about

http://schema.org/alternateName

  • "Power plays"
  • "Power plays"@en
  • "Ruthless dot com"
  • "Ruthless dot com"@en
  • "Ruthless. com"
  • "Ruthless. com"@en
  • "Power Plays"
  • "Ruthless.com"@en
  • "Ruthless.com"
  • "ruthless.com"@en

http://schema.org/description

  • "When Roger Gordian, an American businessman, refuses to sell his sophisticated encryption program to foreign companies, he finds his company the object of a very hostile takeover."
  • "Refusing to put his encryption program on the market, Roger Gordian finds his company the object of a suspicious hostile takeover."@en
  • "Refusing to put his encryption program on the market, Roger Gordian finds his company the object of a suspicious hostile takeover."
  • "Encryption technology keeps the codes for the world's security and communication systems top secret. Deregulating this state-of-the-art technology for export could put a back-door key in the pockets of spies and terrorists around the world. So when American businessman Roger Gordian refuses to put his sophisticated encryption program on the market, he finds his company the object of a corporate takeover--and to say it's hostile doesn't even come close. Only Gordian stands between the nation's military software and political extremists who want to put the leadership of the free world out of business--for good..."@en
  • "American businessman Roger Gordian's company becomes the object of terrorist tactics in the year 2000 after he refuses to sell his sophisticated encryption program for the world's security and communication systems to foreign companies."
  • "La 4ème de couverture indique : Aujourd'hui, les logiciels de cryptage protègent les codes utilisés par les réseaux de communication et les systèmes de sécurité. Autoriser la libre exportation de ces technologies de pointe représenterait d'énormes gains mais donnerait aux espions et aux terroristes l'accès à des données secrètes essentielles pour la sécurité. Quand Roger Gordian, le patron d'UpLink, leader mondial en ce domaine, refuse de céder la licence de ses programmes de chiffrement à des sociétés étrangères, il découvre soudain que son entreprise fait l'objet d'une tentative d'O.P.A. dont le but avoué est précisément la libéralisation du cryptage informatique. Gordian se retrouve seul pour défendre la sécurité du pays. Il va devoir affronter une dangereuse coalition : un réseau de gros bonnets de la drogue, de militaires et de politiciens véreux dont le premier objectif est de le mettre définitivement hors circuit. Fût-ce au prix de la paix mondiale."

http://schema.org/genre

  • "Electronic books"
  • "Electronic books"@en
  • "Spy stories"
  • "Spy stories"@en
  • "Adventure stories"
  • "Spy thrillers"@en
  • "Powieść amerykańska"@pl
  • "Large type books"@en
  • "Fiction"
  • "Fiction"@en
  • "Adventure fiction"
  • "Adventure fiction"@en
  • "Roman d'espionnage américain"
  • "Adventure thrillers"@en
  • "Suspense fiction"@en
  • "Suspense fiction"

http://schema.org/name

  • "Ruthless. com"@en
  • "Ruthless. com"
  • "Tom Clancy power plays. Ruthless. com"
  • "Tom Clancy's Power Plays ruthless.com"@en
  • "Tom Clancy's Power plays : ruthless.com"
  • "Tom Clancy's power plays. Ruthless.com"
  • "Tom Clancy's power plays. Ruthless.com"@en
  • "Ruthless.com"
  • "Tom Clancy's power plays : ruthless.com"
  • "Tom Clancy's power plays : ruthless.com"@en
  • "Ruthless.com"@en
  • "Ruthless.com"@pl
  • "Ruthless.com : roman"
  • "Tom Clancy's Power Plays : Ruthless.com"
  • "Tom Clancy's power plays. Ruthless. com"@en
  • "ruthless.com"
  • "Akhzar.ḳom"
  • "Tom Clancy's power plays: Shadow watch / M"
  • "Tom Clancy's power plays : ruthless. com"

http://schema.org/workExample