Cyber warfare: techniques, tactics and tools for security practitioners
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Waltham, Mass. [u.a.]
Syngress
2014
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xvii, 306 S. Ill. 24 cm |
ISBN: | 9780124166721 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041548925 | ||
003 | DE-604 | ||
005 | 20140221 | ||
007 | t | ||
008 | 140109s2014 ne a||| |||| 00||| eng d | ||
010 | |a 013034031 | ||
020 | |a 9780124166721 |9 978-0-12-416672-1 | ||
035 | |a (OCoLC)873405910 | ||
035 | |a (DE-599)BVBBV041548925 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a ne |c NL | ||
049 | |a DE-12 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 355.3/43 |2 23 | |
084 | |a 8 |2 ssgn | ||
084 | |a 24,1 |2 ssgn | ||
100 | 1 | |a Andress, Jason |e Verfasser |0 (DE-588)101729996X |4 aut | |
245 | 1 | 0 | |a Cyber warfare |b techniques, tactics and tools for security practitioners |c Jason Andress ; Steve Winterfeld. Lillian Ablon, technical editor |
246 | 1 | 3 | |a Cyberwarfare, techniques, tactics and tools for security practitioners |
250 | |a 2. ed. | ||
264 | 1 | |a Waltham, Mass. [u.a.] |b Syngress |c 2014 | |
300 | |a xvii, 306 S. |b Ill. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Information warfare |v Handbooks, manuals, etc | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Winterfeld, Steve |e Verfasser |4 aut | |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026994718&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026994718 | ||
942 | 1 | 1 | |c 302.2 |e 22/bsb |
942 | 1 | 1 | |c 004 |e 22/bsb |
942 | 1 | 1 | |c 355.009 |e 22/bsb |
Datensatz im Suchindex
_version_ | 1804151656620752896 |
---|---|
adam_text | CYBER WARFARE
/ ANDRESS, JASON.
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FOREWORD INTRODUCTION CHAPTER 1. WHAT IS CYBER WARFARE? CHAPTER 2. THE
CYBERSPACE BATTLEFIELD CHAPTER 3. CYBER DOCTRINE CHAPTER 4. CYBER
WARRIORS CHAPTER 5. LOGICAL WEAPONS CHAPTER 6. PHYSICAL WEAPONS CHAPTER
7. PSYCHOLOGICAL WEAPONS CHAPTER 8. COMPUTER NETWORK EXPLOITATION
CHAPTER 9. COMPUTER NETWORK ATTACK CHAPTER 10. COMPUTER NETWORK DEFENSE
CHAPTER 11. NON-STATE ACTORS IN COMPUTER NETWORK OPERATIONS CHAPTER 12.
LEGAL SYSTEM IMPACTS CHAPTER 13. ETHICS CHAPTER 14. CYBERSPACE
CHALLENGES CHAPTER 15. THE FUTURE OF CYBER WAR APPENDIX: CYBER TIMELINE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Andress, Jason Winterfeld, Steve |
author_GND | (DE-588)101729996X |
author_facet | Andress, Jason Winterfeld, Steve |
author_role | aut aut |
author_sort | Andress, Jason |
author_variant | j a ja s w sw |
building | Verbundindex |
bvnumber | BV041548925 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)873405910 (DE-599)BVBBV041548925 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01887nam a2200493 c 4500</leader><controlfield tag="001">BV041548925</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140221 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140109s2014 ne a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">013034031</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166721</subfield><subfield code="9">978-0-12-416672-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)873405910</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041548925</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">ne</subfield><subfield code="c">NL</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)101729996X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare</subfield><subfield code="b">techniques, tactics and tools for security practitioners</subfield><subfield code="c">Jason Andress ; Steve Winterfeld. Lillian Ablon, technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cyberwarfare, techniques, tactics and tools for security practitioners</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Mass. [u.a.]</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 306 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Winterfeld, Steve</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026994718&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026994718</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">004</subfield><subfield code="e">22/bsb</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV041548925 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:58:17Z |
institution | BVB |
isbn | 9780124166721 |
language | English |
lccn | 013034031 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026994718 |
oclc_num | 873405910 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | xvii, 306 S. Ill. 24 cm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Andress, Jason Verfasser (DE-588)101729996X aut Cyber warfare techniques, tactics and tools for security practitioners Jason Andress ; Steve Winterfeld. Lillian Ablon, technical editor Cyberwarfare, techniques, tactics and tools for security practitioners 2. ed. Waltham, Mass. [u.a.] Syngress 2014 xvii, 306 S. Ill. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Information warfare Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Information warfare (DE-588)4461975-3 gnd rswk-swf (DE-588)4151278-9 Einführung gnd-content Information warfare (DE-588)4461975-3 s DE-604 Winterfeld, Steve Verfasser aut LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026994718&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Andress, Jason Winterfeld, Steve Cyber warfare techniques, tactics and tools for security practitioners Information warfare Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4151278-9 |
title | Cyber warfare techniques, tactics and tools for security practitioners |
title_alt | Cyberwarfare, techniques, tactics and tools for security practitioners |
title_auth | Cyber warfare techniques, tactics and tools for security practitioners |
title_exact_search | Cyber warfare techniques, tactics and tools for security practitioners |
title_full | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress ; Steve Winterfeld. Lillian Ablon, technical editor |
title_fullStr | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress ; Steve Winterfeld. Lillian Ablon, technical editor |
title_full_unstemmed | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress ; Steve Winterfeld. Lillian Ablon, technical editor |
title_short | Cyber warfare |
title_sort | cyber warfare techniques tactics and tools for security practitioners |
title_sub | techniques, tactics and tools for security practitioners |
topic | Information warfare Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Information warfare (DE-588)4461975-3 gnd |
topic_facet | Information warfare Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Information warfare Einführung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026994718&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT andressjason cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners AT winterfeldsteve cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners |