Cyber-threats, information warfare, and critical infrastructure protection: defending the U.S. homeland
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Westport, Conn.
Praeger
2002
|
Schlagworte: | |
Beschreibung: | "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." |
Beschreibung: | viii, 189 p. |
ISBN: | 0275974235 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044829518 | ||
003 | DE-604 | ||
005 | 20180305 | ||
007 | cr|uuu---uuuuu | ||
008 | 180305s2002 |||| o||u| ||||||eng d | ||
020 | |a 0275974235 |c alk. paper |9 0-275-97423-5 | ||
035 | |a (ZDB-38-ESG)ebr10005662 | ||
035 | |a (OCoLC)614602171 | ||
035 | |a (DE-599)BVBBV044829518 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Cordesman, Anthony H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber-threats, information warfare, and critical infrastructure protection |b defending the U.S. homeland |c Anthony H. Cordesman with Justin G. Cordesman |
264 | 1 | |a Westport, Conn. |b Praeger |c 2002 | |
300 | |a viii, 189 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." | ||
505 | 8 | |a Includes bibliographical references | |
650 | 4 | |a Electronic data processing |x Security measures |z United States | |
650 | 4 | |a Telecommunication |x Defense measures |z United States | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Information warfare |z United States | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
700 | 1 | |a Cordesman, Justin G. |e Sonstige |4 oth | |
912 | |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030224384 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804178329683623936 |
---|---|
any_adam_object | |
author | Cordesman, Anthony H. |
author_facet | Cordesman, Anthony H. |
author_role | aut |
author_sort | Cordesman, Anthony H. |
author_variant | a h c ah ahc |
building | Verbundindex |
bvnumber | BV044829518 |
collection | ZDB-38-ESG |
contents | Includes bibliographical references |
ctrlnum | (ZDB-38-ESG)ebr10005662 (OCoLC)614602171 (DE-599)BVBBV044829518 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02270nmm a2200553zc 4500</leader><controlfield tag="001">BV044829518</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180305 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180305s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0275974235</subfield><subfield code="c">alk. paper</subfield><subfield code="9">0-275-97423-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-ESG)ebr10005662</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)614602171</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044829518</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cordesman, Anthony H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-threats, information warfare, and critical infrastructure protection</subfield><subfield code="b">defending the U.S. homeland</subfield><subfield code="c">Anthony H. Cordesman with Justin G. Cordesman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Westport, Conn.</subfield><subfield code="b">Praeger</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">viii, 189 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Published in cooperation with the Center for Strategic and International Studies, Washington, D.C."</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield><subfield code="x">Defense measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cordesman, Justin G.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030224384</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV044829518 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:02:15Z |
institution | BVB |
isbn | 0275974235 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030224384 |
oclc_num | 614602171 |
open_access_boolean | |
physical | viii, 189 p. |
psigel | ZDB-38-ESG |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Praeger |
record_format | marc |
spelling | Cordesman, Anthony H. Verfasser aut Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Anthony H. Cordesman with Justin G. Cordesman Westport, Conn. Praeger 2002 viii, 189 p. txt rdacontent c rdamedia cr rdacarrier "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." Includes bibliographical references Electronic data processing Security measures United States Telecommunication Defense measures United States Computer networks Security measures United States Information warfare United States Information warfare (DE-588)4461975-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Datensicherung (DE-588)4011144-1 s 1\p DE-604 Information warfare (DE-588)4461975-3 s 2\p DE-604 Computersicherheit (DE-588)4274324-2 s 3\p DE-604 Cordesman, Justin G. Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cordesman, Anthony H. Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Includes bibliographical references Electronic data processing Security measures United States Telecommunication Defense measures United States Computer networks Security measures United States Information warfare United States Information warfare (DE-588)4461975-3 gnd Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4078704-7 |
title | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland |
title_auth | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland |
title_exact_search | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland |
title_full | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Anthony H. Cordesman with Justin G. Cordesman |
title_fullStr | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Anthony H. Cordesman with Justin G. Cordesman |
title_full_unstemmed | Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland Anthony H. Cordesman with Justin G. Cordesman |
title_short | Cyber-threats, information warfare, and critical infrastructure protection |
title_sort | cyber threats information warfare and critical infrastructure protection defending the u s homeland |
title_sub | defending the U.S. homeland |
topic | Electronic data processing Security measures United States Telecommunication Defense measures United States Computer networks Security measures United States Information warfare United States Information warfare (DE-588)4461975-3 gnd Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Electronic data processing Security measures United States Telecommunication Defense measures United States Computer networks Security measures United States Information warfare United States Information warfare Datensicherung Computersicherheit USA |
work_keys_str_mv | AT cordesmananthonyh cyberthreatsinformationwarfareandcriticalinfrastructureprotectiondefendingtheushomeland AT cordesmanjusting cyberthreatsinformationwarfareandcriticalinfrastructureprotectiondefendingtheushomeland |