Cybersecurity policies and strategies for cyberwarfare prevention:
"This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres"..
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
Information Science Reference, an imprint of IGI Global
[2015]
|
Schriftenreihe: | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-12 DE-706 DE-20 DE-898 DE-1049 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres".. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xix, 472 Seiten) Illustrationen, Diagramme |
ISBN: | 9781466684577 |
DOI: | 10.4018/978-1-4666-8456-0 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV043854922 | ||
003 | DE-604 | ||
005 | 20190925 | ||
007 | cr|uuu---uuuuu | ||
008 | 161102s2015 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781466684577 |9 978-1-4666-8457-7 | ||
024 | 7 | |a 10.4018/978-1-4666-8456-0 |2 doi | |
035 | |a (ZDB-98-IGB)00123849 | ||
035 | |a (OCoLC)992824214 | ||
035 | |a (DE-599)BVBBV043854922 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-706 |a DE-20 |a DE-898 |a DE-1049 |a DE-1050 |a DE-83 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 364.4 |2 23 | |
084 | |a 8 |2 ssgn | ||
245 | 1 | 0 | |a Cybersecurity policies and strategies for cyberwarfare prevention |c Jean-Loup Richet (University of Nantes, France) |
264 | 1 | |a Hershey PA, USA |b Information Science Reference, an imprint of IGI Global |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online-Ressource (xix, 472 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series | |
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
520 | |a "This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres".. | ||
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Cyberspace operations (Military science) | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Richet, Jean-Loup |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-4666-8456-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4666-8456-0 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-4666-8456-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029265145 | |
966 | e | |u https://doi.org/10.4018/978-1-4666-8456-0 |l DE-12 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-8456-0 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-8456-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-8456-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138439266140160 |
---|---|
adam_text | |
any_adam_object | |
author2 | Richet, Jean-Loup |
author2_role | edt |
author2_variant | j l r jlr |
author_facet | Richet, Jean-Loup |
building | Verbundindex |
bvnumber | BV043854922 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)00123849 (OCoLC)992824214 (DE-599)BVBBV043854922 |
dewey-full | 364.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.4 |
dewey-search | 364.4 |
dewey-sort | 3364.4 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
doi_str_mv | 10.4018/978-1-4666-8456-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV043854922</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190925</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161102s2015 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466684577</subfield><subfield code="9">978-1-4666-8457-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-4666-8456-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00123849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992824214</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043854922</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity policies and strategies for cyberwarfare prevention</subfield><subfield code="c">Jean-Loup Richet (University of Nantes, France)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">Information Science Reference, an imprint of IGI Global</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 472 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres"..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Richet, Jean-Loup</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-4666-8456-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4666-8456-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029265145</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043854922 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:29Z |
institution | BVB |
isbn | 9781466684577 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029265145 |
oclc_num | 992824214 |
open_access_boolean | |
owner | DE-12 DE-706 DE-20 DE-898 DE-BY-UBR DE-1049 DE-1050 DE-83 |
owner_facet | DE-12 DE-706 DE-20 DE-898 DE-BY-UBR DE-1049 DE-1050 DE-83 |
physical | 1 Online-Ressource (xix, 472 Seiten) Illustrationen, Diagramme |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Information Science Reference, an imprint of IGI Global |
record_format | marc |
series2 | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series Premier reference source |
spelling | Cybersecurity policies and strategies for cyberwarfare prevention Jean-Loup Richet (University of Nantes, France) Hershey PA, USA Information Science Reference, an imprint of IGI Global [2015] © 2015 1 Online-Ressource (xix, 472 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series Premier reference source Includes bibliographical references and index "This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres".. Cyberterrorism Prevention Cyber intelligence (Computer security) Cyberspace operations (Military science) Computer crimes Prevention Information warfare (DE-588)4461975-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s Information warfare (DE-588)4461975-3 s DE-604 Richet, Jean-Loup edt Erscheint auch als Druck-Ausgabe 1-4666-8456-9 Erscheint auch als Druck-Ausgabe 978-1-4666-8456-0 https://doi.org/10.4018/978-1-4666-8456-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cybersecurity policies and strategies for cyberwarfare prevention Cyberterrorism Prevention Cyber intelligence (Computer security) Cyberspace operations (Military science) Computer crimes Prevention Information warfare (DE-588)4461975-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Cybersecurity policies and strategies for cyberwarfare prevention |
title_auth | Cybersecurity policies and strategies for cyberwarfare prevention |
title_exact_search | Cybersecurity policies and strategies for cyberwarfare prevention |
title_full | Cybersecurity policies and strategies for cyberwarfare prevention Jean-Loup Richet (University of Nantes, France) |
title_fullStr | Cybersecurity policies and strategies for cyberwarfare prevention Jean-Loup Richet (University of Nantes, France) |
title_full_unstemmed | Cybersecurity policies and strategies for cyberwarfare prevention Jean-Loup Richet (University of Nantes, France) |
title_short | Cybersecurity policies and strategies for cyberwarfare prevention |
title_sort | cybersecurity policies and strategies for cyberwarfare prevention |
topic | Cyberterrorism Prevention Cyber intelligence (Computer security) Cyberspace operations (Military science) Computer crimes Prevention Information warfare (DE-588)4461975-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Cyberterrorism Prevention Cyber intelligence (Computer security) Cyberspace operations (Military science) Computer crimes Prevention Information warfare Computersicherheit Aufsatzsammlung |
url | https://doi.org/10.4018/978-1-4666-8456-0 |
work_keys_str_mv | AT richetjeanloup cybersecuritypoliciesandstrategiesforcyberwarfareprevention |