Threat mitigation and detection of cyber warfare and terrorism activities:
"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillan...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global, Disseminator of Knowledge
[2017]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-12 DE-1050 DE-573 DE-91 DE-706 DE-20 DE-1049 DE-898 DE-83 URL des Erstveröffentlichers |
Zusammenfassung: | "This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"... |
Beschreibung: | 1 Online-Ressource (xx, 314 Seiten) Illustrationen, Diagramme, Karten |
ISBN: | 9781522519393 |
DOI: | 10.4018/978-1-5225-1938-6 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044035401 | ||
003 | DE-604 | ||
005 | 20180619 | ||
007 | cr|uuu---uuuuu | ||
008 | 170209s2017 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522519393 |9 978-1-5225-1939-3 | ||
024 | 7 | |a 10.4018/978-1-5225-1938-6 |2 doi | |
035 | |a (OCoLC)973024539 | ||
035 | |a (DE-599)BVBBV044035401 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-706 |a DE-91 |a DE-573 |a DE-1050 |a DE-20 |a DE-1049 |a DE-898 |a DE-83 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 363.325 |2 23 | |
245 | 1 | 0 | |a Threat mitigation and detection of cyber warfare and terrorism activities |c Maximiliano E. Korstanje (University of Palermo, Argentina) |
264 | 1 | |a Hershey, PA |b IGI Global, Disseminator of Knowledge |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 1 Online-Ressource (xx, 314 Seiten) |b Illustrationen, Diagramme, Karten | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
520 | |a "This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"... | ||
650 | 4 | |a Politik | |
650 | 4 | |a Information warfare |x Prevention | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Internet |x Political aspects | |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberterrorismus |0 (DE-588)1118882725 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Cyberterrorismus |0 (DE-588)1118882725 |D s |
689 | 0 | 2 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Korstanje, Maximiliano |d 1976- |0 (DE-588)1123743908 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-5225-1938-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-1938-6 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-1938-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-1938-6 |l DE-12 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805078991163359232 |
---|---|
adam_text | |
any_adam_object | |
author2 | Korstanje, Maximiliano 1976- |
author2_role | edt |
author2_variant | m k mk |
author_GND | (DE-588)1123743908 |
author_facet | Korstanje, Maximiliano 1976- |
building | Verbundindex |
bvnumber | BV044035401 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)973024539 (DE-599)BVBBV044035401 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
doi_str_mv | 10.4018/978-1-5225-1938-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044035401</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180619</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170209s2017 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522519393</subfield><subfield code="9">978-1-5225-1939-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-1938-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)973024539</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044035401</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat mitigation and detection of cyber warfare and terrorism activities</subfield><subfield code="c">Maximiliano E. Korstanje (University of Palermo, Argentina)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 314 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme, Karten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Korstanje, Maximiliano</subfield><subfield code="d">1976-</subfield><subfield code="0">(DE-588)1123743908</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5225-1938-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-1938-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-1938-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044035401 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:37:52Z |
institution | BVB |
isbn | 9781522519393 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029442554 |
oclc_num | 973024539 |
open_access_boolean | |
owner | DE-12 DE-706 DE-91 DE-BY-TUM DE-573 DE-1050 DE-20 DE-1049 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-12 DE-706 DE-91 DE-BY-TUM DE-573 DE-1050 DE-20 DE-1049 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xx, 314 Seiten) Illustrationen, Diagramme, Karten |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje (University of Palermo, Argentina) Hershey, PA IGI Global, Disseminator of Knowledge [2017] © 2017 1 Online-Ressource (xx, 314 Seiten) Illustrationen, Diagramme, Karten txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Premier reference source "This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"... Politik Information warfare Prevention Cyberspace Security measures Cyberterrorism Prevention Computer crimes Prevention Internet Political aspects Prävention (DE-588)4076308-0 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Cyberterrorismus (DE-588)1118882725 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s Cyberterrorismus (DE-588)1118882725 s Prävention (DE-588)4076308-0 s DE-604 Korstanje, Maximiliano 1976- (DE-588)1123743908 edt Erscheint auch als Druck-Ausgabe 978-1-5225-1938-6 Erscheint auch als Druck-Ausgabe 1-5225-1938-6 https://doi.org/10.4018/978-1-5225-1938-6 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Threat mitigation and detection of cyber warfare and terrorism activities Politik Information warfare Prevention Cyberspace Security measures Cyberterrorism Prevention Computer crimes Prevention Internet Political aspects Prävention (DE-588)4076308-0 gnd Information warfare (DE-588)4461975-3 gnd Cyberterrorismus (DE-588)1118882725 gnd |
subject_GND | (DE-588)4076308-0 (DE-588)4461975-3 (DE-588)1118882725 (DE-588)4143413-4 |
title | Threat mitigation and detection of cyber warfare and terrorism activities |
title_auth | Threat mitigation and detection of cyber warfare and terrorism activities |
title_exact_search | Threat mitigation and detection of cyber warfare and terrorism activities |
title_full | Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje (University of Palermo, Argentina) |
title_fullStr | Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje (University of Palermo, Argentina) |
title_full_unstemmed | Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje (University of Palermo, Argentina) |
title_short | Threat mitigation and detection of cyber warfare and terrorism activities |
title_sort | threat mitigation and detection of cyber warfare and terrorism activities |
topic | Politik Information warfare Prevention Cyberspace Security measures Cyberterrorism Prevention Computer crimes Prevention Internet Political aspects Prävention (DE-588)4076308-0 gnd Information warfare (DE-588)4461975-3 gnd Cyberterrorismus (DE-588)1118882725 gnd |
topic_facet | Politik Information warfare Prevention Cyberspace Security measures Cyberterrorism Prevention Computer crimes Prevention Internet Political aspects Prävention Information warfare Cyberterrorismus Aufsatzsammlung |
url | https://doi.org/10.4018/978-1-5225-1938-6 |
work_keys_str_mv | AT korstanjemaximiliano threatmitigationanddetectionofcyberwarfareandterrorismactivities |