Computer attack and cyberterrorism:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, N.Y.
Nova Science Publishers
c2009
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks |
Beschreibung: | 1 Online-Ressource (viii, 75 p.) |
ISBN: | 1606923374 1607416867 9781606923375 9781607416869 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043151228 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 1606923374 |9 1-60692-337-4 | ||
020 | |a 1607416867 |c electronic bk. |9 1-60741-686-7 | ||
020 | |a 9781606923375 |9 978-1-60692-337-5 | ||
020 | |a 9781607416869 |c electronic bk. |9 978-1-60741-686-9 | ||
035 | |a (OCoLC)694772609 | ||
035 | |a (DE-599)BVBBV043151228 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.325/90040973 |2 22 | |
100 | 1 | |a Wilson, Clay |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer attack and cyberterrorism |c Clay Wilson |
264 | 1 | |a New York, N.Y. |b Nova Science Publishers |c c2009 | |
300 | |a 1 Online-Ressource (viii, 75 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a Computersicherheit |2 swd | |
650 | 7 | |a Information warfare |2 swd | |
650 | 7 | |a Bekämpfung |2 swd | |
650 | 7 | |a Internationaler Terrorismus |2 swd | |
650 | 7 | |a Internet |2 swd | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Cyberterrorism |z United States | |
650 | 4 | |a Information warfare |z United States | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Infrastructure (Economics) |x Security measures |z United States | |
650 | 4 | |a National security |z United States | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | 2 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |D s |
689 | 0 | 3 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350596 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028575419 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350596 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350596 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175611112980480 |
---|---|
any_adam_object | |
author | Wilson, Clay |
author_facet | Wilson, Clay |
author_role | aut |
author_sort | Wilson, Clay |
author_variant | c w cw |
building | Verbundindex |
bvnumber | BV043151228 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)694772609 (DE-599)BVBBV043151228 |
dewey-full | 363.325/90040973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/90040973 |
dewey-search | 363.325/90040973 |
dewey-sort | 3363.325 890040973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03364nmm a2200733zc 4500</leader><controlfield tag="001">BV043151228</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606923374</subfield><subfield code="9">1-60692-337-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607416867</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-60741-686-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606923375</subfield><subfield code="9">978-1-60692-337-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607416869</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-60741-686-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)694772609</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043151228</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/90040973</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilson, Clay</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer attack and cyberterrorism</subfield><subfield code="c">Clay Wilson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, N.Y.</subfield><subfield code="b">Nova Science Publishers</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 75 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure (Economics)</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350596</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028575419</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350596</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350596</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV043151228 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:02Z |
institution | BVB |
isbn | 1606923374 1607416867 9781606923375 9781607416869 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028575419 |
oclc_num | 694772609 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (viii, 75 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Nova Science Publishers |
record_format | marc |
spelling | Wilson, Clay Verfasser aut Computer attack and cyberterrorism Clay Wilson New York, N.Y. Nova Science Publishers c2009 1 Online-Ressource (viii, 75 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computersicherheit swd Information warfare swd Bekämpfung swd Internationaler Terrorismus swd Internet swd Terrorismus Cyberterrorism United States Information warfare United States Computer networks Security measures United States Infrastructure (Economics) Security measures United States National security United States Internet (DE-588)4308416-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf Internationaler Terrorismus (DE-588)4162078-1 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Bekämpfung (DE-588)4112701-8 s Internationaler Terrorismus (DE-588)4162078-1 s Internet (DE-588)4308416-3 s 1\p DE-604 Computersicherheit (DE-588)4274324-2 s Information warfare (DE-588)4461975-3 s 2\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350596 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wilson, Clay Computer attack and cyberterrorism POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computersicherheit swd Information warfare swd Bekämpfung swd Internationaler Terrorismus swd Internet swd Terrorismus Cyberterrorism United States Information warfare United States Computer networks Security measures United States Infrastructure (Economics) Security measures United States National security United States Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd Bekämpfung (DE-588)4112701-8 gnd Internationaler Terrorismus (DE-588)4162078-1 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4274324-2 (DE-588)4461975-3 (DE-588)4112701-8 (DE-588)4162078-1 (DE-588)4078704-7 |
title | Computer attack and cyberterrorism |
title_auth | Computer attack and cyberterrorism |
title_exact_search | Computer attack and cyberterrorism |
title_full | Computer attack and cyberterrorism Clay Wilson |
title_fullStr | Computer attack and cyberterrorism Clay Wilson |
title_full_unstemmed | Computer attack and cyberterrorism Clay Wilson |
title_short | Computer attack and cyberterrorism |
title_sort | computer attack and cyberterrorism |
topic | POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computersicherheit swd Information warfare swd Bekämpfung swd Internationaler Terrorismus swd Internet swd Terrorismus Cyberterrorism United States Information warfare United States Computer networks Security measures United States Infrastructure (Economics) Security measures United States National security United States Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd Bekämpfung (DE-588)4112701-8 gnd Internationaler Terrorismus (DE-588)4162078-1 gnd |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Terrorism Computersicherheit Information warfare Bekämpfung Internationaler Terrorismus Internet Terrorismus Cyberterrorism United States Information warfare United States Computer networks Security measures United States Infrastructure (Economics) Security measures United States National security United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350596 |
work_keys_str_mv | AT wilsonclay computerattackandcyberterrorism |