Inside cyber warfare / (Record no. 8682)

000 -LEADER
fixed length control field 01557cam a2200289 a 4500
001 - CONTROL NUMBER
control field 17136282
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220211140844.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120126s2012 cc ab b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781449310042
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.C345 (2e)
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Carr, Jeffrey.
245 10 - TITLE STATEMENT
Title Inside cyber warfare /
Statement of responsibility, etc. Jeffrey Carr.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cambridge :
Name of publisher, distributor, etc. O'Reilly,
Date of publication, distribution, etc. 2012.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 294 p. :
Other physical details ill., maps ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note "Mapping the cyber underworld"--Cover.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Contents: Assessing the problem -- The rise of the nonstate hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Nonstate hackers and social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policymakers from the field -- Conducting operations in the cyber-space-time continuum -- The Russian Federation: information warfare framework -- Cyber warfare capabilities by nation-state -- US department of defense cyber command and organizational structure -- Active defense for cyber: a legal framework for covert countermeasures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information warfare.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Terrorism.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Full call number Barcode Date last seen Copy number Price effective from Koha item type
          WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY Reference 11/02/2022 HV6773.C345(2e) 9170/619/22 11/02/2022 1 11/02/2022 Books

If you have any concerns or questions; kindly contact the library


© Powered by WIUC IT - Support Services Unit