Cyberdeterrence and cyberwar:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
RAND
2009
|
Schriftenreihe: | Rand Corporation monograph series
|
Schlagworte: | |
Online-Zugang: | UBY01 |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xxiv, 214 pages) illustrations |
ISBN: | 9780833048752 0833048759 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045348815 | ||
003 | DE-604 | ||
005 | 20191105 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2009 |||| o||u| ||||||eng d | ||
020 | |a 9780833048752 |9 978-0-8330-4875-2 | ||
020 | |a 0833048759 |9 0-8330-4875-9 | ||
035 | |a (ZDB-4-ITC)ocn559030468 | ||
035 | |a (OCoLC)559030468 | ||
035 | |a (DE-599)BVBBV045348815 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 355.3/43 |2 22 | |
100 | 1 | |a Libicki, Martin C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyberdeterrence and cyberwar |c Martin C. Libicki |
264 | 1 | |a Santa Monica, CA |b RAND |c 2009 | |
300 | |a 1 online resource (xxiv, 214 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Rand Corporation monograph series | |
500 | |a Print version record | ||
505 | 8 | |a Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a TECHNOLOGY / Military Science |2 bisacsh | |
650 | 7 | |a Civil defense |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 4 | |a Information warfare |z United States |a Cyberterrorism |z United States |x Prevention |a Cyberspace |x Security measures |a Computer networks |x Security measures |z United States |a Civil defense |z United States | |
710 | 2 | |a Project Air Force (U.S.) |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Libicki, Martin C. |t Cyberdeterrence and cyberwar |d Santa Monica, CA : RAND, 2009 |z 9780833047342 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735469 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304894 |l UBY01 |p ZDB-4-ITC |q UBY_PDA_ITC_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804179172202905600 |
---|---|
any_adam_object | |
author | Libicki, Martin C. |
author_facet | Libicki, Martin C. |
author_role | aut |
author_sort | Libicki, Martin C. |
author_variant | m c l mc mcl |
building | Verbundindex |
bvnumber | BV045348815 |
collection | ZDB-4-ITC |
contents | Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack |
ctrlnum | (ZDB-4-ITC)ocn559030468 (OCoLC)559030468 (DE-599)BVBBV045348815 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02370nmm a2200469zc 4500</leader><controlfield tag="001">BV045348815</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833048752</subfield><subfield code="9">978-0-8330-4875-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833048759</subfield><subfield code="9">0-8330-4875-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn559030468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)559030468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348815</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberdeterrence and cyberwar</subfield><subfield code="c">Martin C. Libicki</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">RAND</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiv, 214 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rand Corporation monograph series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY / Military Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Civil defense</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="a">Civil defense</subfield><subfield code="z">United States</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Project Air Force (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Libicki, Martin C.</subfield><subfield code="t">Cyberdeterrence and cyberwar</subfield><subfield code="d">Santa Monica, CA : RAND, 2009</subfield><subfield code="z">9780833047342</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735469</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304894</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-ITC</subfield><subfield code="q">UBY_PDA_ITC_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045348815 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:38Z |
institution | BVB |
isbn | 9780833048752 0833048759 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735469 |
oclc_num | 559030468 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 online resource (xxiv, 214 pages) illustrations |
psigel | ZDB-4-ITC ZDB-4-ITC UBY_PDA_ITC_Kauf |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | RAND |
record_format | marc |
series2 | Rand Corporation monograph series |
spelling | Libicki, Martin C. Verfasser aut Cyberdeterrence and cyberwar Martin C. Libicki Santa Monica, CA RAND 2009 1 online resource (xxiv, 214 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Rand Corporation monograph series Print version record Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh TECHNOLOGY / Military Science bisacsh Civil defense fast Computer networks / Security measures fast Cyberterrorism / Prevention fast Information warfare fast Information warfare United States Cyberterrorism United States Prevention Cyberspace Security measures Computer networks Security measures United States Civil defense United States Project Air Force (U.S.) Sonstige oth Erscheint auch als Druck-Ausgabe Libicki, Martin C. Cyberdeterrence and cyberwar Santa Monica, CA : RAND, 2009 9780833047342 |
spellingShingle | Libicki, Martin C. Cyberdeterrence and cyberwar Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh TECHNOLOGY / Military Science bisacsh Civil defense fast Computer networks / Security measures fast Cyberterrorism / Prevention fast Information warfare fast Information warfare United States Cyberterrorism United States Prevention Cyberspace Security measures Computer networks Security measures United States Civil defense United States |
title | Cyberdeterrence and cyberwar |
title_auth | Cyberdeterrence and cyberwar |
title_exact_search | Cyberdeterrence and cyberwar |
title_full | Cyberdeterrence and cyberwar Martin C. Libicki |
title_fullStr | Cyberdeterrence and cyberwar Martin C. Libicki |
title_full_unstemmed | Cyberdeterrence and cyberwar Martin C. Libicki |
title_short | Cyberdeterrence and cyberwar |
title_sort | cyberdeterrence and cyberwar |
topic | COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh TECHNOLOGY / Military Science bisacsh Civil defense fast Computer networks / Security measures fast Cyberterrorism / Prevention fast Information warfare fast Information warfare United States Cyberterrorism United States Prevention Cyberspace Security measures Computer networks Security measures United States Civil defense United States |
topic_facet | COMPUTERS / Security / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism TECHNOLOGY / Military Science Civil defense Computer networks / Security measures Cyberterrorism / Prevention Information warfare Information warfare United States Cyberterrorism United States Prevention Cyberspace Security measures Computer networks Security measures United States Civil defense United States |
work_keys_str_mv | AT libickimartinc cyberdeterrenceandcyberwar AT projectairforceus cyberdeterrenceandcyberwar |