Law, policy, and technology: cyberterrorism, information warfare, and Internet immobilization
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA
Information Science Reference
2012
|
Schlagworte: | |
Beschreibung: | "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher. Includes bibliographical references and index |
Beschreibung: | XV, 496 S. |
ISBN: | 9781615208319 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040635318 | ||
003 | DE-604 | ||
005 | 20130326 | ||
007 | t | ||
008 | 121216s2012 xxu |||| 00||| eng d | ||
010 | |a 2012004590 | ||
020 | |a 9781615208319 |c hbk. |9 978-1-61520-831-9 | ||
035 | |a (OCoLC)835279207 | ||
035 | |a (DE-599)BVBBV040635318 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.325 | |
245 | 1 | 0 | |a Law, policy, and technology |b cyberterrorism, information warfare, and Internet immobilization |c Pauline C. Reich ... |
264 | 1 | |a Hershey, PA |b Information Science Reference |c 2012 | |
300 | |a XV, 496 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher. | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberspace | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Politik |0 (DE-588)4046514-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 3 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 4 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | 5 | |a Politik |0 (DE-588)4046514-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Reich, Pauline |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-61520-832-6 |
999 | |a oai:aleph.bib-bvb.de:BVB01-025462488 | ||
942 | 1 | 1 | |c 302.2 |e 22/bsb |
Datensatz im Suchindex
_version_ | 1804149747932463104 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV040635318 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)835279207 (DE-599)BVBBV040635318 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02401nam a2200577zc 4500</leader><controlfield tag="001">BV040635318</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130326 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">121216s2012 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2012004590</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781615208319</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-61520-831-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)835279207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040635318</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Law, policy, and technology</subfield><subfield code="b">cyberterrorism, information warfare, and Internet immobilization</subfield><subfield code="c">Pauline C. Reich ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 496 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Politik</subfield><subfield code="0">(DE-588)4046514-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Politik</subfield><subfield code="0">(DE-588)4046514-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reich, Pauline</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-61520-832-6</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025462488</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV040635318 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:27:57Z |
institution | BVB |
isbn | 9781615208319 |
language | English |
lccn | 2012004590 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025462488 |
oclc_num | 835279207 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XV, 496 S. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Information Science Reference |
record_format | marc |
spelling | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich ... Hershey, PA Information Science Reference 2012 XV, 496 S. txt rdacontent n rdamedia nc rdacarrier "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher. Includes bibliographical references and index Cyberterrorism Computer crimes Computer security Cyberspace Data protection Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Recht (DE-588)4048737-4 gnd rswk-swf Politik (DE-588)4046514-7 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Internet (DE-588)4308416-3 s Terrorismus (DE-588)4059534-1 s Information warfare (DE-588)4461975-3 s Internetkriminalität (DE-588)7864395-8 s Recht (DE-588)4048737-4 s Politik (DE-588)4046514-7 s DE-604 Reich, Pauline Sonstige oth Erscheint auch als Online-Ausgabe 978-1-61520-832-6 |
spellingShingle | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Cyberterrorism Computer crimes Computer security Cyberspace Data protection Internetkriminalität (DE-588)7864395-8 gnd Internet (DE-588)4308416-3 gnd Information warfare (DE-588)4461975-3 gnd Terrorismus (DE-588)4059534-1 gnd Recht (DE-588)4048737-4 gnd Politik (DE-588)4046514-7 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)4308416-3 (DE-588)4461975-3 (DE-588)4059534-1 (DE-588)4048737-4 (DE-588)4046514-7 (DE-588)4143413-4 |
title | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_auth | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_exact_search | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization |
title_full | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich ... |
title_fullStr | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich ... |
title_full_unstemmed | Law, policy, and technology cyberterrorism, information warfare, and Internet immobilization Pauline C. Reich ... |
title_short | Law, policy, and technology |
title_sort | law policy and technology cyberterrorism information warfare and internet immobilization |
title_sub | cyberterrorism, information warfare, and Internet immobilization |
topic | Cyberterrorism Computer crimes Computer security Cyberspace Data protection Internetkriminalität (DE-588)7864395-8 gnd Internet (DE-588)4308416-3 gnd Information warfare (DE-588)4461975-3 gnd Terrorismus (DE-588)4059534-1 gnd Recht (DE-588)4048737-4 gnd Politik (DE-588)4046514-7 gnd |
topic_facet | Cyberterrorism Computer crimes Computer security Cyberspace Data protection Internetkriminalität Internet Information warfare Terrorismus Recht Politik Aufsatzsammlung |
work_keys_str_mv | AT reichpauline lawpolicyandtechnologycyberterrorisminformationwarfareandinternetimmobilization |