Cyber weaponry: issues and implications of digital arms
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
[2018]
Cham Springer |
Schriftenreihe: | Advanced Sciences and Technologies for Security Applications
|
Schlagworte: | |
Online-Zugang: | URL des Erstveröffentlichers |
Beschreibung: | 1 Online-Ressource (XVI, 198 p. 13 illus., 8 illus. in color) |
ISBN: | 9783319741079 |
ISSN: | 1613-5113 |
DOI: | 10.1007/978-3-319-74107-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045913055 | ||
003 | DE-604 | ||
005 | 20200518 | ||
007 | cr|uuu---uuuuu | ||
008 | 190606s2018 |||| o||u| ||||||eng d | ||
020 | |a 9783319741079 |c Online |9 978-3-319-74107-9 | ||
024 | 7 | |a 10.1007/978-3-319-74107-9 |2 doi | |
035 | |a (ZDB-2-LCR)9783319741079 | ||
035 | |a (OCoLC)1187261112 | ||
035 | |a (DE-599)BVBBV045913055 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-188 |a DE-634 | ||
082 | 0 | |a 364.4 |2 23 | |
245 | 1 | 0 | |a Cyber weaponry |b issues and implications of digital arms |c Henry Prunckun, editor |
264 | 1 | |a Cham |b Springer International Publishing |c [2018] | |
264 | 1 | |a Cham |b Springer | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (XVI, 198 p. 13 illus., 8 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advanced Sciences and Technologies for Security Applications |x 1613-5113 | |
650 | 4 | |a Crime Control and Security | |
650 | 4 | |a International Security Studies | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Business IT Infrastructure | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Military and Defence Studies | |
650 | 4 | |a Public safety | |
650 | 4 | |a Security, International | |
650 | 4 | |a Computer security | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Politics and war | |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Prunckun, Henry W. |d 1954- |0 (DE-588)1031329226 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-74106-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-74108-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-08918-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-74107-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-LCR | ||
940 | 1 | |q ZDB-2-LCR_2018 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031295591 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804180085903720448 |
---|---|
any_adam_object | |
author2 | Prunckun, Henry W. 1954- |
author2_role | edt |
author2_variant | h w p hw hwp |
author_GND | (DE-588)1031329226 |
author_facet | Prunckun, Henry W. 1954- |
building | Verbundindex |
bvnumber | BV045913055 |
collection | ZDB-2-LCR |
ctrlnum | (ZDB-2-LCR)9783319741079 (OCoLC)1187261112 (DE-599)BVBBV045913055 |
dewey-full | 364.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.4 |
dewey-search | 364.4 |
dewey-sort | 3364.4 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
doi_str_mv | 10.1007/978-3-319-74107-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02371nmm a2200625zc 4500</leader><controlfield tag="001">BV045913055</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200518 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190606s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319741079</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-74107-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-74107-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LCR)9783319741079</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1187261112</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045913055</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber weaponry</subfield><subfield code="b">issues and implications of digital arms</subfield><subfield code="c">Henry Prunckun, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 198 p. 13 illus., 8 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced Sciences and Technologies for Security Applications</subfield><subfield code="x">1613-5113</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime Control and Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International Security Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business IT Infrastructure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military and Defence Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, International</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politics and war</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prunckun, Henry W.</subfield><subfield code="d">1954-</subfield><subfield code="0">(DE-588)1031329226</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-74106-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-74108-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-08918-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-74107-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LCR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LCR_2018</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031295591</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV045913055 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:30:10Z |
institution | BVB |
isbn | 9783319741079 |
issn | 1613-5113 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031295591 |
oclc_num | 1187261112 |
open_access_boolean | |
owner | DE-188 DE-634 |
owner_facet | DE-188 DE-634 |
physical | 1 Online-Ressource (XVI, 198 p. 13 illus., 8 illus. in color) |
psigel | ZDB-2-LCR ZDB-2-LCR_2018 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer International Publishing Springer |
record_format | marc |
series2 | Advanced Sciences and Technologies for Security Applications |
spelling | Cyber weaponry issues and implications of digital arms Henry Prunckun, editor Cham Springer International Publishing [2018] Cham Springer © 2018 1 Online-Ressource (XVI, 198 p. 13 illus., 8 illus. in color) txt rdacontent c rdamedia cr rdacarrier Advanced Sciences and Technologies for Security Applications 1613-5113 Crime Control and Security International Security Studies Systems and Data Security Business IT Infrastructure Cybercrime Military and Defence Studies Public safety Security, International Computer security Management information systems Computer crimes Politics and war Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s Computerkriminalität (DE-588)4010452-7 s DE-604 Prunckun, Henry W. 1954- (DE-588)1031329226 edt Erscheint auch als Druck-Ausgabe 978-3-319-74106-2 Erscheint auch als Druck-Ausgabe 978-3-319-74108-6 Erscheint auch als Druck-Ausgabe 978-3-030-08918-4 https://doi.org/10.1007/978-3-319-74107-9 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cyber weaponry issues and implications of digital arms Crime Control and Security International Security Studies Systems and Data Security Business IT Infrastructure Cybercrime Military and Defence Studies Public safety Security, International Computer security Management information systems Computer crimes Politics and war Computerkriminalität (DE-588)4010452-7 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4010452-7 (DE-588)4461975-3 (DE-588)4143413-4 |
title | Cyber weaponry issues and implications of digital arms |
title_auth | Cyber weaponry issues and implications of digital arms |
title_exact_search | Cyber weaponry issues and implications of digital arms |
title_full | Cyber weaponry issues and implications of digital arms Henry Prunckun, editor |
title_fullStr | Cyber weaponry issues and implications of digital arms Henry Prunckun, editor |
title_full_unstemmed | Cyber weaponry issues and implications of digital arms Henry Prunckun, editor |
title_short | Cyber weaponry |
title_sort | cyber weaponry issues and implications of digital arms |
title_sub | issues and implications of digital arms |
topic | Crime Control and Security International Security Studies Systems and Data Security Business IT Infrastructure Cybercrime Military and Defence Studies Public safety Security, International Computer security Management information systems Computer crimes Politics and war Computerkriminalität (DE-588)4010452-7 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Crime Control and Security International Security Studies Systems and Data Security Business IT Infrastructure Cybercrime Military and Defence Studies Public safety Security, International Computer security Management information systems Computer crimes Politics and war Computerkriminalität Information warfare Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-319-74107-9 |
work_keys_str_mv | AT prunckunhenryw cyberweaponryissuesandimplicationsofdigitalarms |