Cyber-threats, information warfare, and critical infrastructure protection: defending the U.S. homeland
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Westport, Conn.
Praeger
2002
|
Schlagworte: | |
Beschreibung: | "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." Includes bibliographical references |
Beschreibung: | viii, 189 p. |
ISBN: | 0275974235 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044181321 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2002 |||| o||u| ||||||eng d | ||
020 | |a 0275974235 |c alk. paper |9 0-275-97423-5 | ||
035 | |a (ZDB-30-PAD)EBC3000517 | ||
035 | |a (ZDB-89-EBL)EBL3000517 | ||
035 | |a (OCoLC)847167752 | ||
035 | |a (DE-599)BVBBV044181321 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Cordesman, Anthony H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber-threats, information warfare, and critical infrastructure protection |b defending the U.S. homeland |c Anthony H. Cordesman with Justin G. Cordesman |
264 | 1 | |a Westport, Conn. |b Praeger |c 2002 | |
300 | |a viii, 189 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." | ||
500 | |a Includes bibliographical references | ||
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Electronic data processing |x Security measures |z United States | |
650 | 4 | |a Telecommunication |x Defense measures |z United States | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Information warfare |z United States | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
700 | 1 | |a Cordesman, Justin G. |e Sonstige |4 oth | |
912 | |a ZDB-30-PAD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029588166 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177306362576896 |
---|---|
any_adam_object | |
author | Cordesman, Anthony H. |
author_facet | Cordesman, Anthony H. |
author_role | aut |
author_sort | Cordesman, Anthony H. |
author_variant | a h c ah ahc |
building | Verbundindex |
bvnumber | BV044181321 |
collection | ZDB-30-PAD |
ctrlnum | (ZDB-30-PAD)EBC3000517 (ZDB-89-EBL)EBL3000517 (OCoLC)847167752 (DE-599)BVBBV044181321 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02362nmm a2200589zc 4500</leader><controlfield tag="001">BV044181321</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0275974235</subfield><subfield code="c">alk. paper</subfield><subfield code="9">0-275-97423-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC3000517</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL3000517</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)847167752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044181321</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cordesman, Anthony H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-threats, information warfare, and critical infrastructure protection</subfield><subfield code="b">defending the U.S. homeland</subfield><subfield code="c">Anthony H. Cordesman with Justin G. Cordesman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Westport, Conn.</subfield><subfield code="b">Praeger</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">viii, 189 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Published in cooperation with the Center for Strategic and International Studies, Washington, D.C."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield><subfield code="x">Defense measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cordesman, Justin G.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029588166</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV044181321 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:45:59Z |
institution | BVB |
isbn | 0275974235 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029588166 |
oclc_num | 847167752 |
open_access_boolean | |
physical | viii, 189 p. |
psigel | ZDB-30-PAD |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Praeger |
record_format | marc |
spelling | Cordesman, Anthony H. Verfasser aut Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Anthony H. Cordesman with Justin G. Cordesman Westport, Conn. Praeger 2002 viii, 189 p. txt rdacontent c rdamedia cr rdacarrier "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." Includes bibliographical references Datenverarbeitung Electronic data processing Security measures United States Telecommunication Defense measures United States Computer networks Security measures United States Information warfare United States Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Datensicherung (DE-588)4011144-1 s 1\p DE-604 Information warfare (DE-588)4461975-3 s 2\p DE-604 Computersicherheit (DE-588)4274324-2 s 3\p DE-604 Cordesman, Justin G. Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cordesman, Anthony H. Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Datenverarbeitung Electronic data processing Security measures United States Telecommunication Defense measures United States Computer networks Security measures United States Information warfare United States Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4461975-3 (DE-588)4078704-7 |
title | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland |
title_auth | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland |
title_exact_search | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland |
title_full | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Anthony H. Cordesman with Justin G. Cordesman |
title_fullStr | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Anthony H. Cordesman with Justin G. Cordesman |
title_full_unstemmed | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Anthony H. Cordesman with Justin G. Cordesman |
title_short | Cyber-threats, information warfare, and critical infrastructure protection |
title_sort | cyber threats information warfare and critical infrastructure protection defending the u s homeland |
title_sub | defending the U.S. homeland |
topic | Datenverarbeitung Electronic data processing Security measures United States Telecommunication Defense measures United States Computer networks Security measures United States Information warfare United States Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Datenverarbeitung Electronic data processing Security measures United States Telecommunication Defense measures United States Computer networks Security measures United States Information warfare United States Datensicherung Computersicherheit Information warfare USA |
work_keys_str_mv | AT cordesmananthonyh cyberthreatsinformationwarfareandcriticalinfrastructureprotectiondefendingtheushomeland AT cordesmanjusting cyberthreatsinformationwarfareandcriticalinfrastructureprotectiondefendingtheushomeland |