Computer attack and cyberterrorism /:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, N.Y. :
Nova Science Publishers,
©2009.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource (viii, 75 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781607416869 1607416867 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn694772609 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 110103s2009 nyu ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d NLGGC |d OCLCO |d OCLCQ |d AGLDB |d OCLCF |d OCLCO |d VNS |d OCLCQ |d VTS |d OCLCA |d AU@ |d OCLCA |d M8D |d VLY |d OCLCQ |d OCLCO |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1162408338 |a 1241965840 | ||
020 | |a 9781607416869 |q (electronic bk.) | ||
020 | |a 1607416867 |q (electronic bk.) | ||
020 | |z 9781606923375 | ||
020 | |z 1606923374 | ||
035 | |a (OCoLC)694772609 |z (OCoLC)1162408338 |z (OCoLC)1241965840 | ||
043 | |a n-us--- | ||
050 | 4 | |a HV6773.2 |b .W55 2009eb | |
072 | 7 | |a POL |x 037000 |2 bisacsh | |
082 | 7 | |a 363.325/90040973 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Wilson, Clay. | |
245 | 1 | 0 | |a Computer attack and cyberterrorism / |c Clay Wilson. |
260 | |a New York, N.Y. : |b Nova Science Publishers, |c ©2009. | ||
300 | |a 1 online resource (viii, 75 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks. | |
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Cyberterrorism |z United States. | |
650 | 0 | |a Information warfare |z United States. | |
650 | 0 | |a Computer networks |x Security measures |z United States. | |
650 | 0 | |a Infrastructure (Economics) |x Security measures |z United States. | |
650 | 0 | |a National security |z United States. |0 http://id.loc.gov/authorities/subjects/sh85140387 | |
650 | 6 | |a Cyberterrorisme |z États-Unis. | |
650 | 6 | |a Guerre de l'information |z États-Unis. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |z États-Unis. | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Terrorism. |2 bisacsh | |
650 | 7 | |a Infrastructure (Economics) |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 7 | |a National security |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Information warfare |2 gnd | |
650 | 7 | |a Bekämpfung |2 gnd |0 http://d-nb.info/gnd/4112701-8 | |
650 | 7 | |a Internationaler Terrorismus |2 gnd |0 http://d-nb.info/gnd/4162078-1 | |
650 | 7 | |a Internet |2 gnd |0 http://d-nb.info/gnd/4308416-3 | |
651 | 7 | |a USA |2 gnd |0 http://d-nb.info/gnd/4078704-7 | |
776 | 0 | 8 | |i Print version: |a Wilson, Clay. |t Computer attack and cyberterrorism. |d New York, N.Y. : Nova Science Publishers, ©2009 |z 9781606923375 |w (DLC) 2008049022 |w (OCoLC)277118357 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350596 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350596 |3 Volltext | |
938 | |a EBSCOhost |b EBSC |n 350596 | ||
938 | |a YBP Library Services |b YANK |n 3589226 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn694772609 |
---|---|
_version_ | 1813903390722228225 |
adam_text | |
any_adam_object | |
author | Wilson, Clay |
author_facet | Wilson, Clay |
author_role | |
author_sort | Wilson, Clay |
author_variant | c w cw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.2 .W55 2009eb |
callnumber-search | HV6773.2 .W55 2009eb |
callnumber-sort | HV 46773.2 W55 42009EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks. |
ctrlnum | (OCoLC)694772609 |
dewey-full | 363.325/90040973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/90040973 |
dewey-search | 363.325/90040973 |
dewey-sort | 3363.325 890040973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03259cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn694772609</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">110103s2009 nyu ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VNS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCA</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCA</subfield><subfield code="d">M8D</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1162408338</subfield><subfield code="a">1241965840</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607416869</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607416867</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781606923375</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1606923374</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)694772609</subfield><subfield code="z">(OCoLC)1162408338</subfield><subfield code="z">(OCoLC)1241965840</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773.2</subfield><subfield code="b">.W55 2009eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325/90040973</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilson, Clay.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer attack and cyberterrorism /</subfield><subfield code="c">Clay Wilson.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">New York, N.Y. :</subfield><subfield code="b">Nova Science Publishers,</subfield><subfield code="c">©2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (viii, 75 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Infrastructure (Economics)</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="z">United States.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85140387</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre de l'information</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Infrastructure (Economics)</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4112701-8</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4162078-1</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4308416-3</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4078704-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Wilson, Clay.</subfield><subfield code="t">Computer attack and cyberterrorism.</subfield><subfield code="d">New York, N.Y. : Nova Science Publishers, ©2009</subfield><subfield code="z">9781606923375</subfield><subfield code="w">(DLC) 2008049022</subfield><subfield code="w">(OCoLC)277118357</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350596</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350596</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">350596</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3589226</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq USA gnd http://d-nb.info/gnd/4078704-7 |
geographic_facet | United States USA |
id | ZDB-4-EBA-ocn694772609 |
illustrated | Not Illustrated |
indexdate | 2024-10-25T16:17:56Z |
institution | BVB |
isbn | 9781607416869 1607416867 |
language | English |
oclc_num | 694772609 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (viii, 75 pages) |
psigel | ZDB-4-EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Nova Science Publishers, |
record_format | marc |
spelling | Wilson, Clay. Computer attack and cyberterrorism / Clay Wilson. New York, N.Y. : Nova Science Publishers, ©2009. 1 online resource (viii, 75 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks. Print version record. English. Cyberterrorism United States. Information warfare United States. Computer networks Security measures United States. Infrastructure (Economics) Security measures United States. National security United States. http://id.loc.gov/authorities/subjects/sh85140387 Cyberterrorisme États-Unis. Guerre de l'information États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh Infrastructure (Economics) Security measures fast Computer networks Security measures fast Cyberterrorism fast Information warfare fast National security fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Computersicherheit gnd Information warfare gnd Bekämpfung gnd http://d-nb.info/gnd/4112701-8 Internationaler Terrorismus gnd http://d-nb.info/gnd/4162078-1 Internet gnd http://d-nb.info/gnd/4308416-3 USA gnd http://d-nb.info/gnd/4078704-7 Print version: Wilson, Clay. Computer attack and cyberterrorism. New York, N.Y. : Nova Science Publishers, ©2009 9781606923375 (DLC) 2008049022 (OCoLC)277118357 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350596 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350596 Volltext |
spellingShingle | Wilson, Clay Computer attack and cyberterrorism / Introduction -- Background -- Issues for Congress -- Legislative activity -- Appendix A. Planning for a cyberattack -- Appendix B. Characteristics of malicious code -- Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks. Cyberterrorism United States. Information warfare United States. Computer networks Security measures United States. Infrastructure (Economics) Security measures United States. National security United States. http://id.loc.gov/authorities/subjects/sh85140387 Cyberterrorisme États-Unis. Guerre de l'information États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh Infrastructure (Economics) Security measures fast Computer networks Security measures fast Cyberterrorism fast Information warfare fast National security fast Computersicherheit gnd Information warfare gnd Bekämpfung gnd http://d-nb.info/gnd/4112701-8 Internationaler Terrorismus gnd http://d-nb.info/gnd/4162078-1 Internet gnd http://d-nb.info/gnd/4308416-3 |
subject_GND | http://id.loc.gov/authorities/subjects/sh85140387 http://d-nb.info/gnd/4112701-8 http://d-nb.info/gnd/4162078-1 http://d-nb.info/gnd/4308416-3 http://d-nb.info/gnd/4078704-7 |
title | Computer attack and cyberterrorism / |
title_auth | Computer attack and cyberterrorism / |
title_exact_search | Computer attack and cyberterrorism / |
title_full | Computer attack and cyberterrorism / Clay Wilson. |
title_fullStr | Computer attack and cyberterrorism / Clay Wilson. |
title_full_unstemmed | Computer attack and cyberterrorism / Clay Wilson. |
title_short | Computer attack and cyberterrorism / |
title_sort | computer attack and cyberterrorism |
topic | Cyberterrorism United States. Information warfare United States. Computer networks Security measures United States. Infrastructure (Economics) Security measures United States. National security United States. http://id.loc.gov/authorities/subjects/sh85140387 Cyberterrorisme États-Unis. Guerre de l'information États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh Infrastructure (Economics) Security measures fast Computer networks Security measures fast Cyberterrorism fast Information warfare fast National security fast Computersicherheit gnd Information warfare gnd Bekämpfung gnd http://d-nb.info/gnd/4112701-8 Internationaler Terrorismus gnd http://d-nb.info/gnd/4162078-1 Internet gnd http://d-nb.info/gnd/4308416-3 |
topic_facet | Cyberterrorism United States. Information warfare United States. Computer networks Security measures United States. Infrastructure (Economics) Security measures United States. National security United States. Cyberterrorisme États-Unis. Guerre de l'information États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. Infrastructure (Economics) Security measures Computer networks Security measures Cyberterrorism Information warfare National security United States Computersicherheit Bekämpfung Internationaler Terrorismus Internet USA |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=350596 |
work_keys_str_mv | AT wilsonclay computerattackandcyberterrorism |