Cybersecurity, botnets, and cyberterrorism:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York
Nova Science Publishers
c2009
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Order code RL32114.". - "Order code RL32706." Includes bibliographical references and index Includes bibliographical references Botnets, cybercrime, and cyberterrorism : vulnerabilities and policy issues for Congress / George V. Jacobson -- Spyware : background and policy issues / Patricia Moloney Figliola |
Beschreibung: | 1 Online-Ressource (viii, 71 p.) |
ISBN: | 1617282170 9781617282171 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043127280 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 1617282170 |c electronic bk. |9 1-61728-217-0 | ||
020 | |a 9781617282171 |c electronic bk. |9 978-1-61728-217-1 | ||
035 | |a (OCoLC)659564267 | ||
035 | |a (DE-599)BVBBV043127280 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 364.16/80973 |2 22 | |
100 | 1 | |a Jacobson, George V. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybersecurity, botnets, and cyberterrorism |c George V. Jacobson |
264 | 1 | |a New York |b Nova Science Publishers |c c2009 | |
300 | |a 1 Online-Ressource (viii, 71 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Order code RL32114.". - "Order code RL32706." | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Includes bibliographical references | ||
500 | |a Botnets, cybercrime, and cyberterrorism : vulnerabilities and policy issues for Congress / George V. Jacobson -- Spyware : background and policy issues / Patricia Moloney Figliola | ||
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer viruses |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a National security |2 fast | |
650 | 7 | |a Spyware (Computer software) |2 fast | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer viruses | |
650 | 4 | |a Spyware (Computer software) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a National security |z United States | |
651 | 4 | |a USA | |
700 | 1 | |a Figliola, Patricia Moloney |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=333556 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028551471 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=333556 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=333556 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175562925670400 |
---|---|
any_adam_object | |
author | Jacobson, George V. |
author_facet | Jacobson, George V. |
author_role | aut |
author_sort | Jacobson, George V. |
author_variant | g v j gv gvj |
building | Verbundindex |
bvnumber | BV043127280 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)659564267 (DE-599)BVBBV043127280 |
dewey-full | 364.16/80973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/80973 |
dewey-search | 364.16/80973 |
dewey-sort | 3364.16 580973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02434nmm a2200577zc 4500</leader><controlfield tag="001">BV043127280</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1617282170</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-61728-217-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781617282171</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-61728-217-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)659564267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043127280</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/80973</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jacobson, George V.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity, botnets, and cyberterrorism</subfield><subfield code="c">George V. Jacobson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Nova Science Publishers</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 71 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Order code RL32114.". - "Order code RL32706."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Botnets, cybercrime, and cyberterrorism : vulnerabilities and policy issues for Congress / George V. Jacobson -- Spyware : background and policy issues / Patricia Moloney Figliola</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Spyware (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Spyware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Figliola, Patricia Moloney</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=333556</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028551471</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=333556</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=333556</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043127280 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:16Z |
institution | BVB |
isbn | 1617282170 9781617282171 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028551471 |
oclc_num | 659564267 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (viii, 71 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Nova Science Publishers |
record_format | marc |
spelling | Jacobson, George V. Verfasser aut Cybersecurity, botnets, and cyberterrorism George V. Jacobson New York Nova Science Publishers c2009 1 Online-Ressource (viii, 71 p.) txt rdacontent c rdamedia cr rdacarrier "Order code RL32114.". - "Order code RL32706." Includes bibliographical references and index Includes bibliographical references Botnets, cybercrime, and cyberterrorism : vulnerabilities and policy issues for Congress / George V. Jacobson -- Spyware : background and policy issues / Patricia Moloney Figliola TRUE CRIME / White Collar Crime bisacsh Computer crimes fast Computer networks / Security measures fast Computer security fast Computer viruses fast Cyberterrorism fast National security fast Spyware (Computer software) fast Computer crimes Cyberterrorism Computer viruses Spyware (Computer software) Computer security Computer networks Security measures National security United States USA Figliola, Patricia Moloney Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=333556 Aggregator Volltext |
spellingShingle | Jacobson, George V. Cybersecurity, botnets, and cyberterrorism TRUE CRIME / White Collar Crime bisacsh Computer crimes fast Computer networks / Security measures fast Computer security fast Computer viruses fast Cyberterrorism fast National security fast Spyware (Computer software) fast Computer crimes Cyberterrorism Computer viruses Spyware (Computer software) Computer security Computer networks Security measures National security United States |
title | Cybersecurity, botnets, and cyberterrorism |
title_auth | Cybersecurity, botnets, and cyberterrorism |
title_exact_search | Cybersecurity, botnets, and cyberterrorism |
title_full | Cybersecurity, botnets, and cyberterrorism George V. Jacobson |
title_fullStr | Cybersecurity, botnets, and cyberterrorism George V. Jacobson |
title_full_unstemmed | Cybersecurity, botnets, and cyberterrorism George V. Jacobson |
title_short | Cybersecurity, botnets, and cyberterrorism |
title_sort | cybersecurity botnets and cyberterrorism |
topic | TRUE CRIME / White Collar Crime bisacsh Computer crimes fast Computer networks / Security measures fast Computer security fast Computer viruses fast Cyberterrorism fast National security fast Spyware (Computer software) fast Computer crimes Cyberterrorism Computer viruses Spyware (Computer software) Computer security Computer networks Security measures National security United States |
topic_facet | TRUE CRIME / White Collar Crime Computer crimes Computer networks / Security measures Computer security Computer viruses Cyberterrorism National security Spyware (Computer software) Computer networks Security measures National security United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=333556 |
work_keys_str_mv | AT jacobsongeorgev cybersecuritybotnetsandcyberterrorism AT figliolapatriciamoloney cybersecuritybotnetsandcyberterrorism |