Inside cyber warfare / (Record no. 8682)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01557cam a2200289 a 4500 |
001 - CONTROL NUMBER | |
control field | 17136282 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220211140844.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 120126s2012 cc ab b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781449310042 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Transcribing agency | DLC |
Modifying agency | DLC |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV6773.C345 (2e) |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Carr, Jeffrey. |
245 10 - TITLE STATEMENT | |
Title | Inside cyber warfare / |
Statement of responsibility, etc. | Jeffrey Carr. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Cambridge : |
Name of publisher, distributor, etc. | O'Reilly, |
Date of publication, distribution, etc. | 2012. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xviii, 294 p. : |
Other physical details | ill., maps ; |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | "Mapping the cyber underworld"--Cover. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Contents: Assessing the problem -- The rise of the nonstate hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Nonstate hackers and social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policymakers from the field -- Conducting operations in the cyber-space-time continuum -- The Russian Federation: information warfare framework -- Cyber warfare capabilities by nation-state -- US department of defense cyber command and organizational structure -- Active defense for cyber: a legal framework for covert countermeasures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberterrorism. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information warfare. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Terrorism. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent location | Current location | Shelving location | Date acquired | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | Reference | 11/02/2022 | HV6773.C345(2e) | 9170/619/22 | 11/02/2022 | 1 | 11/02/2022 | Books |