Cyberwar, cyberterror, cybercrime: a guide to the role of standards in an environment of change and danger
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2008
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xi, 268 p |
ISBN: | 9781905356478 1905356471 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044141744 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2008 |||| o||u| ||||||eng d | ||
020 | |a 9781905356478 |c pbk. |9 978-1-905356-47-8 | ||
020 | |a 1905356471 |c pbk. |9 1-905356-47-1 | ||
035 | |a (ZDB-30-PAD)EBC480406 | ||
035 | |a (ZDB-89-EBL)EBL480406 | ||
035 | |a (OCoLC)609854817 | ||
035 | |a (DE-599)BVBBV044141744 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.802/18 |2 22 | |
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
100 | 1 | |a Mehan, Julie E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyberwar, cyberterror, cybercrime |b a guide to the role of standards in an environment of change and danger |c Julie E. Mehan |
264 | 1 | |a Ely |b IT Governance Pub. |c 2008 | |
300 | |a xi, 268 p | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Computer networks |x Security measures |x Standards | |
650 | 4 | |a Computer networks |x Security measures |x Quality control | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-905356-47-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-905356-47-1 |
912 | |a ZDB-30-PAD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029548589 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177237852815360 |
---|---|
any_adam_object | |
author | Mehan, Julie E. |
author_facet | Mehan, Julie E. |
author_role | aut |
author_sort | Mehan, Julie E. |
author_variant | j e m je jem |
building | Verbundindex |
bvnumber | BV044141744 |
classification_rvk | PZ 3700 |
collection | ZDB-30-PAD |
ctrlnum | (ZDB-30-PAD)EBC480406 (ZDB-89-EBL)EBL480406 (OCoLC)609854817 (DE-599)BVBBV044141744 |
dewey-full | 005.802/18 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.802/18 |
dewey-search | 005.802/18 |
dewey-sort | 15.802 218 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01957nmm a2200505zc 4500</leader><controlfield tag="001">BV044141744</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781905356478</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-905356-47-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1905356471</subfield><subfield code="c">pbk.</subfield><subfield code="9">1-905356-47-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC480406</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL480406</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)609854817</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044141744</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.802/18</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mehan, Julie E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberwar, cyberterror, cybercrime</subfield><subfield code="b">a guide to the role of standards in an environment of change and danger</subfield><subfield code="c">Julie E. Mehan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xi, 268 p</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-905356-47-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-905356-47-1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029548589</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044141744 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:44:53Z |
institution | BVB |
isbn | 9781905356478 1905356471 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029548589 |
oclc_num | 609854817 |
open_access_boolean | |
physical | xi, 268 p |
psigel | ZDB-30-PAD |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Mehan, Julie E. Verfasser aut Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Julie E. Mehan Ely IT Governance Pub. 2008 xi, 268 p txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Computer crimes Prevention Cyberterrorism Prevention Computer networks Security measures Standards Computer networks Security measures Quality control Internet Security measures Information warfare (DE-588)4461975-3 gnd rswk-swf Cyberattacke (DE-588)1075612675 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Information warfare (DE-588)4461975-3 s Cyberattacke (DE-588)1075612675 s 1\p DE-604 Erscheint auch als Druck-Ausgabe, Paperback 978-1-905356-47-8 Erscheint auch als Druck-Ausgabe, Paperback 1-905356-47-1 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Mehan, Julie E. Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Computer crimes Prevention Cyberterrorism Prevention Computer networks Security measures Standards Computer networks Security measures Quality control Internet Security measures Information warfare (DE-588)4461975-3 gnd Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)1075612675 (DE-588)4274324-2 |
title | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger |
title_auth | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger |
title_exact_search | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger |
title_full | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Julie E. Mehan |
title_fullStr | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Julie E. Mehan |
title_full_unstemmed | Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger Julie E. Mehan |
title_short | Cyberwar, cyberterror, cybercrime |
title_sort | cyberwar cyberterror cybercrime a guide to the role of standards in an environment of change and danger |
title_sub | a guide to the role of standards in an environment of change and danger |
topic | Computer crimes Prevention Cyberterrorism Prevention Computer networks Security measures Standards Computer networks Security measures Quality control Internet Security measures Information warfare (DE-588)4461975-3 gnd Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer crimes Prevention Cyberterrorism Prevention Computer networks Security measures Standards Computer networks Security measures Quality control Internet Security measures Information warfare Cyberattacke Computersicherheit |
work_keys_str_mv | AT mehanjuliee cyberwarcyberterrorcybercrimeaguidetotheroleofstandardsinanenvironmentofchangeanddanger |