Cyber warfare and cyber terrorism:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA [u.a.]
Information Science Reference
2007
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | "This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher. Includes bibliographical references and index |
Beschreibung: | XXX, 532 S. Ill., graph. Darst. |
ISBN: | 9781591409915 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022386622 | ||
003 | DE-604 | ||
005 | 20120329 | ||
007 | t | ||
008 | 070416s2007 xxuad|| |||| 00||| eng d | ||
010 | |a 2006102336 | ||
020 | |a 9781591409915 |9 978-1-59140-991-5 | ||
035 | |a (OCoLC)219506206 | ||
035 | |a (DE-599)BVBBV022386622 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 355.3/43 | |
084 | |a 8 |2 ssgn | ||
245 | 1 | 0 | |a Cyber warfare and cyber terrorism |c [ed. by] Lech J. Janczewski ... |
264 | 1 | |a Hershey, PA [u.a.] |b Information Science Reference |c 2007 | |
300 | |a XXX, 532 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher. | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a aComputer crimes | |
650 | 4 | |a aInformation warfare | |
650 | 4 | |a Information warfare | |
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Attentat |0 (DE-588)4003451-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | 1 | |a Attentat |0 (DE-588)4003451-3 |D s |
689 | 1 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
700 | 1 | |a Janczewski, Lech |d 1943- |e Sonstige |0 (DE-588)173435300 |4 oth | |
856 | 4 | 2 | |m Digitalisierung BSBMuenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015595539&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-015595539 |
Datensatz im Suchindex
_version_ | 1810687541524824064 |
---|---|
adam_text |
Table
Preface
Acknowledgment
Introductory Chapter
Section I
Terms, Concepts, and Definitions
Chapter I
Cyber Terrorism Attacks
Chapter II
Knowledge Management, Terrorism, and Cyber Terrorism
Chapter III
Ten Information Warfare Trends
Chapter IV
Bits and Bytes vs. Bullets and Bombs: A New Form of Warfare
Mahesh Raisinghani.
Chapter V
Infrastructures of Cyber Warfare
Chapter VI
Terrorism and the Internet
Chapter
Steganography
Chapter
Glyptography
Chapter IX
A Roadmap for Delivering Trustworthy IT Processes
Ibrahim
Section
Dynamic
Chapter X
An Introduction to Key Themes in the Economics of Cyber Security
Chapter XI
Role of FS-ISAC in Countering Cyber Terrorism
Chapter
Deception in Cyber Attacks
Chapter
Deception in Defense of Computer Systems from Cyber Attack /Neil
Chapter
Ethics of Cyber War Attacks I Neil
Chapter XV
International Outsourcing, Personal Data, and Cyber Terrorism: Approaches for Oversight
Kirk St.Amant
Chapter
Network-Based Passive Information Gathering
Chapter
Electronic Money Management in Modern Online Businesses
Theodores Tzouramanis
Chapter
The Analysis of Money Laundering Techniques
Chapter
Spam,
Chapter XX
Malware:
Chapter
SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases
Theodoros Tzouramanis
Section
Human Aspects of Cyber Warfare and Cyber Terrorism
Chapter
Electronic Surveillance and Civil Rights
Ciaran
Chapter
Social Engineering
Chapter
Social Engineering I Michael Aiello
Chapter
Behavioral Information Security
Chapter
Toward a Deeper Understanding of Personnel Anomaly Detection
Chapter
Cyber Stalking: A Challenge for Web Security
Section IV
Technical Aspects of Handling Cyber Attacks
Chapter
Cyber Security Models
Chapter
Cyber War Defense: Systems Development with Integrated Security
Chapter
Antispam
JoonS. Park
Chapter
Denial-of-Service (DoS) Attacks: Prevention, Intrusion Detection, and Mitigation
Âme
Chapter
Large-Scale Monitoring of Critical Digital Infrastructures
Chapter
Public Key Infrastructures as a Means for Increasing Network Security
Stergios S. Chochliouws,
Chapter
Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism
Chapter
Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism
Mark R. Leipnik
Section V
Identification, Authorization, and Access Control
Chapter
Hacking and Eavesdropping
Chapter
Access Control Models
Chapter
An Overview of IDS Using Anomaly Detection
Chapter
Bio-Cyber Machine Gun: A New Mode of Authentication Access Using Visual Evoked Potentials
Andrews Samraj
Chapter XL
Content-Based Policy Specification for Multimedia Authorization and Access Control Model
Bechara
Chapter
Data Mining
Chapter
Identification and Localization of Digital Addresses on the Internet
Chapter
Identification Through Data Mining I Diego
Section VI
Business Continuity
Chapter
A Model for Emergency Response Systems
Chapter
Bouncing Techniques
Chapter
Cyber Forensics
Chapter
Software Component Survivability in Information Warfare I
Chapter
Taxonomy for Computer Security Incidents
Section
Cyber Warfare and Cyber Terrorism: National and International Responses
Chapter
Measures for Ensuring Data Protection and Citizen Privacy Against the Threat of Crime and Terrorism:
The European Response
Chapter
EU
Chapter LI
The U.S. Military Response to Cyber Warfare I Richard J. Kilroy, Jr.
Chapter
USA's View on World Cyber Security Issues
Chapter
ECHELON and the NSAI
Chapter
International Cybercrime Convention
Epilogue
Glossary
Compilation of References
About the Editors
Index |
adam_txt |
Table
Preface
Acknowledgment
Introductory Chapter
Section I
Terms, Concepts, and Definitions
Chapter I
Cyber Terrorism Attacks
Chapter II
Knowledge Management, Terrorism, and Cyber Terrorism
Chapter III
Ten Information Warfare Trends
Chapter IV
Bits and Bytes vs. Bullets and Bombs: A New Form of Warfare
Mahesh Raisinghani.
Chapter V
Infrastructures of Cyber Warfare
Chapter VI
Terrorism and the Internet
Chapter
Steganography
Chapter
Glyptography
Chapter IX
A Roadmap for Delivering Trustworthy IT Processes
Ibrahim
Section
Dynamic
Chapter X
An Introduction to Key Themes in the Economics of Cyber Security
Chapter XI
Role of FS-ISAC in Countering Cyber Terrorism
Chapter
Deception in Cyber Attacks
Chapter
Deception in Defense of Computer Systems from Cyber Attack /Neil
Chapter
Ethics of Cyber War Attacks I Neil
Chapter XV
International Outsourcing, Personal Data, and Cyber Terrorism: Approaches for Oversight
Kirk St.Amant
Chapter
Network-Based Passive Information Gathering
Chapter
Electronic Money Management in Modern Online Businesses
Theodores Tzouramanis
Chapter
The Analysis of Money Laundering Techniques
Chapter
Spam,
Chapter XX
Malware:
Chapter
SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases
Theodoros Tzouramanis
Section
Human Aspects of Cyber Warfare and Cyber Terrorism
Chapter
Electronic Surveillance and Civil Rights
Ciaran
Chapter
Social Engineering
Chapter
Social Engineering I Michael Aiello
Chapter
Behavioral Information Security
Chapter
Toward a Deeper Understanding of Personnel Anomaly Detection
Chapter
Cyber Stalking: A Challenge for Web Security
Section IV
Technical Aspects of Handling Cyber Attacks
Chapter
Cyber Security Models
Chapter
Cyber War Defense: Systems Development with Integrated Security
Chapter
Antispam
JoonS. Park
Chapter
Denial-of-Service (DoS) Attacks: Prevention, Intrusion Detection, and Mitigation
Âme
Chapter
Large-Scale Monitoring of Critical Digital Infrastructures
Chapter
Public Key Infrastructures as a Means for Increasing Network Security
Stergios S. Chochliouws,
Chapter
Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism
Chapter
Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism
Mark R. Leipnik
Section V
Identification, Authorization, and Access Control
Chapter
Hacking and Eavesdropping
Chapter
Access Control Models
Chapter
An Overview of IDS Using Anomaly Detection
Chapter
Bio-Cyber Machine Gun: A New Mode of Authentication Access Using Visual Evoked Potentials
Andrews Samraj
Chapter XL
Content-Based Policy Specification for Multimedia Authorization and Access Control Model
Bechara
Chapter
Data Mining
Chapter
Identification and Localization of Digital Addresses on the Internet
Chapter
Identification Through Data Mining I Diego
Section VI
Business Continuity
Chapter
A Model for Emergency Response Systems
Chapter
Bouncing Techniques
Chapter
Cyber Forensics
Chapter
Software Component Survivability in Information Warfare I
Chapter
Taxonomy for Computer Security Incidents
Section
Cyber Warfare and Cyber Terrorism: National and International Responses
Chapter
Measures for Ensuring Data Protection and Citizen Privacy Against the Threat of Crime and Terrorism:
The European Response
Chapter
EU
Chapter LI
The U.S. Military Response to Cyber Warfare I Richard J. Kilroy, Jr.
Chapter
USA's View on World Cyber Security Issues
Chapter
ECHELON and the NSAI
Chapter
International Cybercrime Convention
Epilogue
Glossary
Compilation of References
About the Editors
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)173435300 |
building | Verbundindex |
bvnumber | BV022386622 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)219506206 (DE-599)BVBBV022386622 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
discipline_str_mv | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV022386622</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120329</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070416s2007 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006102336</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781591409915</subfield><subfield code="9">978-1-59140-991-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)219506206</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022386622</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare and cyber terrorism</subfield><subfield code="c">[ed. by] Lech J. Janczewski ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA [u.a.]</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXX, 532 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aComputer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aInformation warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Janczewski, Lech</subfield><subfield code="d">1943-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)173435300</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015595539&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015595539</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV022386622 |
illustrated | Illustrated |
index_date | 2024-07-02T17:12:51Z |
indexdate | 2024-09-20T04:23:23Z |
institution | BVB |
isbn | 9781591409915 |
language | English |
lccn | 2006102336 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015595539 |
oclc_num | 219506206 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XXX, 532 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Information Science Reference |
record_format | marc |
spelling | Cyber warfare and cyber terrorism [ed. by] Lech J. Janczewski ... Hershey, PA [u.a.] Information Science Reference 2007 XXX, 532 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier "This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher. Includes bibliographical references and index aComputer crimes aInformation warfare Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Attentat (DE-588)4003451-3 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s Terrorismus (DE-588)4059534-1 s DE-604 Attentat (DE-588)4003451-3 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s 2\p DE-604 3\p DE-604 Janczewski, Lech 1943- Sonstige (DE-588)173435300 oth Digitalisierung BSBMuenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015595539&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cyber warfare and cyber terrorism aComputer crimes aInformation warfare Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4003451-3 (DE-588)4059534-1 (DE-588)4143413-4 |
title | Cyber warfare and cyber terrorism |
title_auth | Cyber warfare and cyber terrorism |
title_exact_search | Cyber warfare and cyber terrorism |
title_exact_search_txtP | Cyber warfare and cyber terrorism |
title_full | Cyber warfare and cyber terrorism [ed. by] Lech J. Janczewski ... |
title_fullStr | Cyber warfare and cyber terrorism [ed. by] Lech J. Janczewski ... |
title_full_unstemmed | Cyber warfare and cyber terrorism [ed. by] Lech J. Janczewski ... |
title_short | Cyber warfare and cyber terrorism |
title_sort | cyber warfare and cyber terrorism |
topic | aComputer crimes aInformation warfare Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | aComputer crimes aInformation warfare Information warfare Computer crimes Rechnernetz Computersicherheit Attentat Terrorismus Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015595539&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT janczewskilech cyberwarfareandcyberterrorism |