Cyberwar, cyberterror, cybercrime: a guide to the role of standards in an environment of change and danger
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance
2008
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XI, 271 S. 22 cm |
ISBN: | 9781905356478 1905356471 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV041472241 | ||
003 | DE-604 | ||
005 | 20160127 | ||
007 | t | ||
008 | 131211s2008 xxk |||| 00||| eng d | ||
010 | |a 2008396673 | ||
020 | |a 9781905356478 |c pbk. |9 978-1-905356-47-8 | ||
020 | |a 1905356471 |c pbk. |9 1-905356-47-1 | ||
035 | |a (OCoLC)706972588 | ||
035 | |a (DE-599)BVBBV041472241 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-20 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 005.802/18 | |
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
100 | 1 | |a Mehan, Julie E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyberwar, cyberterror, cybercrime |b a guide to the role of standards in an environment of change and danger |c Julie E. Mehan |
264 | 1 | |a Ely |b IT Governance |c 2008 | |
300 | |a XI, 271 S. |c 22 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Computer networks |x Security measures |x Standards | |
650 | 4 | |a Computer networks |x Security measures |x Quality control | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-026918354 |
Datensatz im Suchindex
_version_ | 1804151609386598400 |
---|---|
any_adam_object | |
author | Mehan, Julie E. |
author_facet | Mehan, Julie E. |
author_role | aut |
author_sort | Mehan, Julie E. |
author_variant | j e m je jem |
building | Verbundindex |
bvnumber | BV041472241 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | PZ 3700 |
ctrlnum | (OCoLC)706972588 (DE-599)BVBBV041472241 |
dewey-full | 005.802/18 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.802/18 |
dewey-search | 005.802/18 |
dewey-sort | 15.802 218 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01689nam a2200481zc 4500</leader><controlfield tag="001">BV041472241</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160127 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">131211s2008 xxk |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008396673</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781905356478</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-905356-47-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1905356471</subfield><subfield code="c">pbk.</subfield><subfield code="9">1-905356-47-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706972588</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041472241</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.802/18</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mehan, Julie E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberwar, cyberterror, cybercrime</subfield><subfield code="b">a guide to the role of standards in an environment of change and danger</subfield><subfield code="c">Julie E. Mehan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 271 S.</subfield><subfield code="c">22 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026918354</subfield></datafield></record></collection> |
id | DE-604.BV041472241 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:57:32Z |
institution | BVB |
isbn | 9781905356478 1905356471 |
language | English |
lccn | 2008396673 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026918354 |
oclc_num | 706972588 |
open_access_boolean | |
owner | DE-20 |
owner_facet | DE-20 |
physical | XI, 271 S. 22 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IT Governance |
record_format | marc |
spelling | Mehan, Julie E. Verfasser aut Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Julie E. Mehan Ely IT Governance 2008 XI, 271 S. 22 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Computer crimes Prevention Cyberterrorism Prevention Computer networks Security measures Standards Computer networks Security measures Quality control Internet Security measures Cyberattacke (DE-588)1075612675 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Information warfare (DE-588)4461975-3 s Cyberattacke (DE-588)1075612675 s DE-604 |
spellingShingle | Mehan, Julie E. Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Computer crimes Prevention Cyberterrorism Prevention Computer networks Security measures Standards Computer networks Security measures Quality control Internet Security measures Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)1075612675 (DE-588)4274324-2 (DE-588)4461975-3 |
title | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger |
title_auth | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger |
title_exact_search | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger |
title_full | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Julie E. Mehan |
title_fullStr | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Julie E. Mehan |
title_full_unstemmed | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Julie E. Mehan |
title_short | Cyberwar, cyberterror, cybercrime |
title_sort | cyberwar cyberterror cybercrime a guide to the role of standards in an environment of change and danger |
title_sub | a guide to the role of standards in an environment of change and danger |
topic | Computer crimes Prevention Cyberterrorism Prevention Computer networks Security measures Standards Computer networks Security measures Quality control Internet Security measures Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Computer crimes Prevention Cyberterrorism Prevention Computer networks Security measures Standards Computer networks Security measures Quality control Internet Security measures Cyberattacke Computersicherheit Information warfare |
work_keys_str_mv | AT mehanjuliee cyberwarcyberterrorcybercrimeaguidetotheroleofstandardsinanenvironmentofchangeanddanger |