Computer attack and cyberterrorism:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York
Nova Science Publ.
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 75 S. |
ISBN: | 9781606923375 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035338439 | ||
003 | DE-604 | ||
005 | 20090518 | ||
007 | t | ||
008 | 090302s2009 xxu |||| 00||| eng d | ||
010 | |a 2008049022 | ||
020 | |a 9781606923375 |c softcover |9 978-1-606-92337-5 | ||
035 | |a (OCoLC)277118357 | ||
035 | |a (DE-599)BVBBV035338439 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a HV6773.2 | |
082 | 0 | |a 363.325/90040973 | |
100 | 1 | |a Wilson, Clay |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer attack and cyberterrorism |c Clay Wilson |
264 | 1 | |a New York |b Nova Science Publ. |c 2009 | |
300 | |a VIII, 75 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Cyberterrorism |z United States | |
650 | 4 | |a Information warfare |z United States | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Infrastructure (Economics) |x Security measures |z United States | |
650 | 4 | |a National security |z United States | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 1 | 2 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |D s |
689 | 1 | 3 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017142767&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017142767 |
Datensatz im Suchindex
_version_ | 1804138653494018048 |
---|---|
adam_text | COMPUTER ATTACK AND CYBERTERRORISM
/ WILSON, CLAY
: C2009
TABLE OF CONTENTS / INHALTSVERZEICHNIS
BACKGROUND
ISSUES FOR CONGRESS
LEGISLATIVE ACTIVITY.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Wilson, Clay |
author_facet | Wilson, Clay |
author_role | aut |
author_sort | Wilson, Clay |
author_variant | c w cw |
building | Verbundindex |
bvnumber | BV035338439 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.2 |
callnumber-search | HV6773.2 |
callnumber-sort | HV 46773.2 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)277118357 (DE-599)BVBBV035338439 |
dewey-full | 363.325/90040973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/90040973 |
dewey-search | 363.325/90040973 |
dewey-sort | 3363.325 890040973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02176nam a2200565zc 4500</leader><controlfield tag="001">BV035338439</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090518 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090302s2009 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008049022</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606923375</subfield><subfield code="c">softcover</subfield><subfield code="9">978-1-606-92337-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)277118357</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035338439</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/90040973</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilson, Clay</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer attack and cyberterrorism</subfield><subfield code="c">Clay Wilson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Nova Science Publ.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 75 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure (Economics)</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017142767&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017142767</subfield></datafield></record></collection> |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV035338439 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T21:31:37Z |
institution | BVB |
isbn | 9781606923375 |
language | English |
lccn | 2008049022 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017142767 |
oclc_num | 277118357 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | VIII, 75 S. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Nova Science Publ. |
record_format | marc |
spelling | Wilson, Clay Verfasser aut Computer attack and cyberterrorism Clay Wilson New York Nova Science Publ. 2009 VIII, 75 S. txt rdacontent n rdamedia nc rdacarrier Cyberterrorism United States Information warfare United States Computer networks Security measures United States Infrastructure (Economics) Security measures United States National security United States Internet (DE-588)4308416-3 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Internationaler Terrorismus (DE-588)4162078-1 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Computersicherheit (DE-588)4274324-2 s Information warfare (DE-588)4461975-3 s DE-604 Bekämpfung (DE-588)4112701-8 s Internationaler Terrorismus (DE-588)4162078-1 s Internet (DE-588)4308416-3 s LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017142767&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Wilson, Clay Computer attack and cyberterrorism Cyberterrorism United States Information warfare United States Computer networks Security measures United States Infrastructure (Economics) Security measures United States National security United States Internet (DE-588)4308416-3 gnd Information warfare (DE-588)4461975-3 gnd Internationaler Terrorismus (DE-588)4162078-1 gnd Bekämpfung (DE-588)4112701-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4461975-3 (DE-588)4162078-1 (DE-588)4112701-8 (DE-588)4274324-2 (DE-588)4078704-7 |
title | Computer attack and cyberterrorism |
title_auth | Computer attack and cyberterrorism |
title_exact_search | Computer attack and cyberterrorism |
title_full | Computer attack and cyberterrorism Clay Wilson |
title_fullStr | Computer attack and cyberterrorism Clay Wilson |
title_full_unstemmed | Computer attack and cyberterrorism Clay Wilson |
title_short | Computer attack and cyberterrorism |
title_sort | computer attack and cyberterrorism |
topic | Cyberterrorism United States Information warfare United States Computer networks Security measures United States Infrastructure (Economics) Security measures United States National security United States Internet (DE-588)4308416-3 gnd Information warfare (DE-588)4461975-3 gnd Internationaler Terrorismus (DE-588)4162078-1 gnd Bekämpfung (DE-588)4112701-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Cyberterrorism United States Information warfare United States Computer networks Security measures United States Infrastructure (Economics) Security measures United States National security United States Internet Information warfare Internationaler Terrorismus Bekämpfung Computersicherheit USA |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017142767&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wilsonclay computerattackandcyberterrorism |