An assessment of the Department of Defense strategy for operating in cyberspace:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Carlisle, PA
U.S. Army War College
2013
|
Schriftenreihe: | The Letort papers
|
Schlagworte: | |
Beschreibung: | "September 2013.". - Includes bibliographical references (p. 37-44) |
Beschreibung: | IX, 46 S. |
ISBN: | 9781584875888 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041642236 | ||
003 | DE-604 | ||
005 | 20180523 | ||
007 | t | ||
008 | 140211s2013 xxu |||| 00||| eng d | ||
010 | |a 013464147 | ||
020 | |a 9781584875888 |c pbk. |9 978-1-58487-588-8 | ||
035 | |a (OCoLC)873473472 | ||
035 | |a (DE-599)BVBBV041642236 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a UA23.3 | |
084 | |a 8 |2 ssgn | ||
100 | 1 | |a Chen, Thomas M. |e Verfasser |0 (DE-588)1056945060 |4 aut | |
245 | 1 | 0 | |a An assessment of the Department of Defense strategy for operating in cyberspace |c Thomas M. Chen |
264 | 1 | |a Carlisle, PA |b U.S. Army War College |c 2013 | |
300 | |a IX, 46 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Letort papers | |
500 | |a "September 2013.". - Includes bibliographical references (p. 37-44) | ||
610 | 2 | 4 | |a United States. |b Department of Defense |x Rules and practice |x Evaluation |
650 | 4 | |a Politik | |
650 | 4 | |a Cyberspace |x Government policy |z United States |x Evaluation | |
650 | 4 | |a Computer networks |x Security measures |z United States |x Evaluation | |
650 | 4 | |a Cyberinfrastructure |x Security measures |z United States |x Evaluation | |
650 | 4 | |a Cyberterrorism |z United States |x Prevention |x Evaluation | |
650 | 4 | |a National security |z United States | |
650 | 4 | |a Information warfare |z United States | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteidigung |0 (DE-588)4063254-4 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Verteidigung |0 (DE-588)4063254-4 |D s |
689 | 0 | |5 DE-604 | |
710 | 2 | |a Strategic Studies Institute (Carlisle Barracks, Pa.) |e Sonstige |0 (DE-588)1046371-9 |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027083008 | ||
942 | 1 | 1 | |c 070.9 |e 22/bsb |f 0905 |g 73 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 0905 |g 73 |
942 | 1 | 1 | |c 302.2 |e 22/bsb |g 73 |
Datensatz im Suchindex
_version_ | 1804151865735118848 |
---|---|
any_adam_object | |
author | Chen, Thomas M. |
author_GND | (DE-588)1056945060 |
author_facet | Chen, Thomas M. |
author_role | aut |
author_sort | Chen, Thomas M. |
author_variant | t m c tm tmc |
building | Verbundindex |
bvnumber | BV041642236 |
callnumber-first | U - Military Science |
callnumber-label | UA23 |
callnumber-raw | UA23.3 |
callnumber-search | UA23.3 |
callnumber-sort | UA 223.3 |
callnumber-subject | UA - Armies |
ctrlnum | (OCoLC)873473472 (DE-599)BVBBV041642236 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02114nam a2200565 c 4500</leader><controlfield tag="001">BV041642236</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180523 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140211s2013 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">013464147</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781584875888</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-58487-588-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)873473472</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041642236</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">UA23.3</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chen, Thomas M.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1056945060</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">An assessment of the Department of Defense strategy for operating in cyberspace</subfield><subfield code="c">Thomas M. Chen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Carlisle, PA</subfield><subfield code="b">U.S. Army War College</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 46 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Letort papers</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"September 2013.". - Includes bibliographical references (p. 37-44)</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States.</subfield><subfield code="b">Department of Defense</subfield><subfield code="x">Rules and practice</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberinfrastructure</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteidigung</subfield><subfield code="0">(DE-588)4063254-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Verteidigung</subfield><subfield code="0">(DE-588)4063254-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Strategic Studies Institute (Carlisle Barracks, Pa.)</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1046371-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027083008</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">070.9</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield><subfield code="g">73</subfield></datafield></record></collection> |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV041642236 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:01:37Z |
institution | BVB |
institution_GND | (DE-588)1046371-9 |
isbn | 9781584875888 |
language | English |
lccn | 013464147 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027083008 |
oclc_num | 873473472 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | IX, 46 S. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | U.S. Army War College |
record_format | marc |
series2 | The Letort papers |
spelling | Chen, Thomas M. Verfasser (DE-588)1056945060 aut An assessment of the Department of Defense strategy for operating in cyberspace Thomas M. Chen Carlisle, PA U.S. Army War College 2013 IX, 46 S. txt rdacontent n rdamedia nc rdacarrier The Letort papers "September 2013.". - Includes bibliographical references (p. 37-44) United States. Department of Defense Rules and practice Evaluation Politik Cyberspace Government policy United States Evaluation Computer networks Security measures United States Evaluation Cyberinfrastructure Security measures United States Evaluation Cyberterrorism United States Prevention Evaluation National security United States Information warfare United States Information warfare (DE-588)4461975-3 gnd rswk-swf Verteidigung (DE-588)4063254-4 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Information warfare (DE-588)4461975-3 s Verteidigung (DE-588)4063254-4 s DE-604 Strategic Studies Institute (Carlisle Barracks, Pa.) Sonstige (DE-588)1046371-9 oth |
spellingShingle | Chen, Thomas M. An assessment of the Department of Defense strategy for operating in cyberspace United States. Department of Defense Rules and practice Evaluation Politik Cyberspace Government policy United States Evaluation Computer networks Security measures United States Evaluation Cyberinfrastructure Security measures United States Evaluation Cyberterrorism United States Prevention Evaluation National security United States Information warfare United States Information warfare (DE-588)4461975-3 gnd Verteidigung (DE-588)4063254-4 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4063254-4 (DE-588)4078704-7 |
title | An assessment of the Department of Defense strategy for operating in cyberspace |
title_auth | An assessment of the Department of Defense strategy for operating in cyberspace |
title_exact_search | An assessment of the Department of Defense strategy for operating in cyberspace |
title_full | An assessment of the Department of Defense strategy for operating in cyberspace Thomas M. Chen |
title_fullStr | An assessment of the Department of Defense strategy for operating in cyberspace Thomas M. Chen |
title_full_unstemmed | An assessment of the Department of Defense strategy for operating in cyberspace Thomas M. Chen |
title_short | An assessment of the Department of Defense strategy for operating in cyberspace |
title_sort | an assessment of the department of defense strategy for operating in cyberspace |
topic | United States. Department of Defense Rules and practice Evaluation Politik Cyberspace Government policy United States Evaluation Computer networks Security measures United States Evaluation Cyberinfrastructure Security measures United States Evaluation Cyberterrorism United States Prevention Evaluation National security United States Information warfare United States Information warfare (DE-588)4461975-3 gnd Verteidigung (DE-588)4063254-4 gnd |
topic_facet | United States. Department of Defense Rules and practice Evaluation Politik Cyberspace Government policy United States Evaluation Computer networks Security measures United States Evaluation Cyberinfrastructure Security measures United States Evaluation Cyberterrorism United States Prevention Evaluation National security United States Information warfare United States Information warfare Verteidigung USA |
work_keys_str_mv | AT chenthomasm anassessmentofthedepartmentofdefensestrategyforoperatingincyberspace AT strategicstudiesinstitutecarlislebarrackspa anassessmentofthedepartmentofdefensestrategyforoperatingincyberspace |