Cyber warfare and cyber terrorism:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA [u.a.]
Information Science Reference
2007
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-12 DE-83 Volltext |
Beschreibung: | "This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher. Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (XXX, 532 S.) Ill., graph. Darst. |
ISBN: | 9781591409922 |
DOI: | 10.4018/978-1-59140-991-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043805446 | ||
003 | DE-604 | ||
005 | 20211102 | ||
007 | cr|uuu---uuuuu | ||
008 | 160929s2007 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781591409922 |c Online |9 978-1-59140-992-2 | ||
024 | 7 | |a 10.4018/978-1-59140-991-5 |2 doi | |
035 | |a (ZDB-98-IGB)00000225 | ||
035 | |a (OCoLC)731013113 | ||
035 | |a (DE-599)BVBBV043805446 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-83 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 355.3/43 | |
084 | |a 8 |2 ssgn | ||
245 | 1 | 0 | |a Cyber warfare and cyber terrorism |c [ed. by] Lech J. Janczewski ... |
264 | 1 | |a Hershey, PA [u.a.] |b Information Science Reference |c 2007 | |
300 | |a 1 Online-Ressource (XXX, 532 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a "This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher. | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a aComputer crimes | |
650 | 4 | |a aInformation warfare | |
650 | 4 | |a Information warfare | |
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Attentat |0 (DE-588)4003451-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | 1 | |a Attentat |0 (DE-588)4003451-3 |D s |
689 | 1 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
700 | 1 | |a Janczewski, Lech |d 1943- |e Sonstige |0 (DE-588)173435300 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-59140-991-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 1-59140-991-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, softcover |z 978-1-61692-749-3 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-59140-991-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029216805 | |
966 | e | |u https://doi.org/10.4018/978-1-59140-991-5 |l DE-12 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-991-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1810687566899314688 |
---|---|
adam_text | |
any_adam_object | |
author_GND | (DE-588)173435300 |
building | Verbundindex |
bvnumber | BV043805446 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00000225 (OCoLC)731013113 (DE-599)BVBBV043805446 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
doi_str_mv | 10.4018/978-1-59140-991-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV043805446</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211102</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160929s2007 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781591409922</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-59140-992-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59140-991-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00000225</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)731013113</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043805446</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare and cyber terrorism</subfield><subfield code="c">[ed. by] Lech J. Janczewski ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA [u.a.]</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXX, 532 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aComputer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aInformation warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Janczewski, Lech</subfield><subfield code="d">1943-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)173435300</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-59140-991-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">1-59140-991-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, softcover</subfield><subfield code="z">978-1-61692-749-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-59140-991-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029216805</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-991-5</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-991-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043805446 |
illustrated | Illustrated |
indexdate | 2024-09-20T04:23:47Z |
institution | BVB |
isbn | 9781591409922 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029216805 |
oclc_num | 731013113 |
open_access_boolean | |
owner | DE-12 DE-83 |
owner_facet | DE-12 DE-83 |
physical | 1 Online-Ressource (XXX, 532 S.) Ill., graph. Darst. |
psigel | ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Cyber warfare and cyber terrorism [ed. by] Lech J. Janczewski ... Hershey, PA [u.a.] Information Science Reference 2007 1 Online-Ressource (XXX, 532 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Premier reference source "This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher. Includes bibliographical references and index aComputer crimes aInformation warfare Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Attentat (DE-588)4003451-3 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s Terrorismus (DE-588)4059534-1 s DE-604 Attentat (DE-588)4003451-3 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s 2\p DE-604 3\p DE-604 Janczewski, Lech 1943- Sonstige (DE-588)173435300 oth Erscheint auch als Druck-Ausgabe, Hardcover 978-1-59140-991-5 Erscheint auch als Druck-Ausgabe, Hardcover 1-59140-991-8 Erscheint auch als Druck-Ausgabe, softcover 978-1-61692-749-3 https://doi.org/10.4018/978-1-59140-991-5 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cyber warfare and cyber terrorism aComputer crimes aInformation warfare Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4003451-3 (DE-588)4059534-1 (DE-588)4143413-4 |
title | Cyber warfare and cyber terrorism |
title_auth | Cyber warfare and cyber terrorism |
title_exact_search | Cyber warfare and cyber terrorism |
title_full | Cyber warfare and cyber terrorism [ed. by] Lech J. Janczewski ... |
title_fullStr | Cyber warfare and cyber terrorism [ed. by] Lech J. Janczewski ... |
title_full_unstemmed | Cyber warfare and cyber terrorism [ed. by] Lech J. Janczewski ... |
title_short | Cyber warfare and cyber terrorism |
title_sort | cyber warfare and cyber terrorism |
topic | aComputer crimes aInformation warfare Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | aComputer crimes aInformation warfare Information warfare Computer crimes Rechnernetz Computersicherheit Attentat Terrorismus Aufsatzsammlung |
url | https://doi.org/10.4018/978-1-59140-991-5 |
work_keys_str_mv | AT janczewskilech cyberwarfareandcyberterrorism |