Developments in information security and cybernetic wars:
"This book focuses on cyber warfare and terrorism using examples from around the world. It covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism"--
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book focuses on cyber warfare and terrorism using examples from around the world. It covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism"-- |
Beschreibung: | 19 PDFs (xix, 351 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522583059 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00216820 | ||
003 | IGIG | ||
005 | 20190325175945.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190326s2019 pau fob 001 0 eng d | ||
010 | |z 2018050686 | ||
020 | |a 9781522583059 |q ebook | ||
020 | |z 9781522583042 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-8304-2 |2 doi | |
035 | |a (CaBNVSL)slc20733003 | ||
035 | |a (OCoLC)1090787779 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b D5135 2019e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Developments in information security and cybernetic wars |c Muhammad Sarfraz, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2019] | |
300 | |a 19 PDFs (xix, 351 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. On cyber crimes and cyber security -- Chapter 2. Artificial intelligence and big data analytics in support of cyber defense -- Chapter 3. A strategic decision-making framework in cyberspace -- Chapter 4. The opportunities for a national cyber strategy and social media in the rhizome networks -- Chapter 5. Building blocks and measurement of national cyberpower -- Chapter 6. Detecting ddos attacks on multiple network hosts: advanced pattern detection method for the identification of intelligent botnet attacks -- Chapter 7. The evolution of cyber warfare in information operations targeting Estonia, the U.S., and Ukraine -- Chapter 8. The new front line (enhanced): updating the concept of enemy in the onlife age -- Chapter 9. Big data analysis for terroristic behavior identification and study using social networks: illegal armed groups during the conflict in Donbas Region (East Ukraine) -- Chapter 10. Russian information warfare and 9/11 conspiracism: when fake news meets false prophecy -- Chapter 11. The double edge of the information sword -- Chapter 12. Positive vs. negative emotions and network size: an exploratory study of twitter users. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book focuses on cyber warfare and terrorism using examples from around the world. It covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/26/2019). | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Cyberterrorism. | |
700 | 1 | |a Sarfraz, Muhammad, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018050686 | |
776 | 0 | 8 | |i Print version: |z 1522583041 |z 9781522583042 |w (DLC) 2018050686 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00216820 |
---|---|
_version_ | 1816797081454510080 |
adam_text | |
any_adam_object | |
author2 | Sarfraz, Muhammad |
author2_role | edt |
author2_variant | m s ms |
author_facet | Sarfraz, Muhammad |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 D5135 2019e |
callnumber-search | QA76.9.A25 D5135 2019e |
callnumber-sort | QA 276.9 A25 D5135 42019E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. On cyber crimes and cyber security -- Chapter 2. Artificial intelligence and big data analytics in support of cyber defense -- Chapter 3. A strategic decision-making framework in cyberspace -- Chapter 4. The opportunities for a national cyber strategy and social media in the rhizome networks -- Chapter 5. Building blocks and measurement of national cyberpower -- Chapter 6. Detecting ddos attacks on multiple network hosts: advanced pattern detection method for the identification of intelligent botnet attacks -- Chapter 7. The evolution of cyber warfare in information operations targeting Estonia, the U.S., and Ukraine -- Chapter 8. The new front line (enhanced): updating the concept of enemy in the onlife age -- Chapter 9. Big data analysis for terroristic behavior identification and study using social networks: illegal armed groups during the conflict in Donbas Region (East Ukraine) -- Chapter 10. Russian information warfare and 9/11 conspiracism: when fake news meets false prophecy -- Chapter 11. The double edge of the information sword -- Chapter 12. Positive vs. negative emotions and network size: an exploratory study of twitter users. |
ctrlnum | (CaBNVSL)slc20733003 (OCoLC)1090787779 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03061nam a2200445 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00216820</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190325175945.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190326s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018050686</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522583059</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522583042</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-8304-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20733003</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1090787779</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">D5135 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Developments in information security and cybernetic wars </subfield><subfield code="c">Muhammad Sarfraz, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">19 PDFs (xix, 351 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. On cyber crimes and cyber security -- Chapter 2. Artificial intelligence and big data analytics in support of cyber defense -- Chapter 3. A strategic decision-making framework in cyberspace -- Chapter 4. The opportunities for a national cyber strategy and social media in the rhizome networks -- Chapter 5. Building blocks and measurement of national cyberpower -- Chapter 6. Detecting ddos attacks on multiple network hosts: advanced pattern detection method for the identification of intelligent botnet attacks -- Chapter 7. The evolution of cyber warfare in information operations targeting Estonia, the U.S., and Ukraine -- Chapter 8. The new front line (enhanced): updating the concept of enemy in the onlife age -- Chapter 9. Big data analysis for terroristic behavior identification and study using social networks: illegal armed groups during the conflict in Donbas Region (East Ukraine) -- Chapter 10. Russian information warfare and 9/11 conspiracism: when fake news meets false prophecy -- Chapter 11. The double edge of the information sword -- Chapter 12. Positive vs. negative emotions and network size: an exploratory study of twitter users.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book focuses on cyber warfare and terrorism using examples from around the world. It covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/26/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sarfraz, Muhammad,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018050686</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522583041</subfield><subfield code="z">9781522583042</subfield><subfield code="w">(DLC) 2018050686</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00216820 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:54Z |
institution | BVB |
isbn | 9781522583059 |
language | English |
oclc_num | 1090787779 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 19 PDFs (xix, 351 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Developments in information security and cybernetic wars Muhammad Sarfraz, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2019] 19 PDFs (xix, 351 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. On cyber crimes and cyber security -- Chapter 2. Artificial intelligence and big data analytics in support of cyber defense -- Chapter 3. A strategic decision-making framework in cyberspace -- Chapter 4. The opportunities for a national cyber strategy and social media in the rhizome networks -- Chapter 5. Building blocks and measurement of national cyberpower -- Chapter 6. Detecting ddos attacks on multiple network hosts: advanced pattern detection method for the identification of intelligent botnet attacks -- Chapter 7. The evolution of cyber warfare in information operations targeting Estonia, the U.S., and Ukraine -- Chapter 8. The new front line (enhanced): updating the concept of enemy in the onlife age -- Chapter 9. Big data analysis for terroristic behavior identification and study using social networks: illegal armed groups during the conflict in Donbas Region (East Ukraine) -- Chapter 10. Russian information warfare and 9/11 conspiracism: when fake news meets false prophecy -- Chapter 11. The double edge of the information sword -- Chapter 12. Positive vs. negative emotions and network size: an exploratory study of twitter users. Restricted to subscribers or individual electronic text purchasers. "This book focuses on cyber warfare and terrorism using examples from around the world. It covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/26/2019). Computer security. Cyberterrorism. Sarfraz, Muhammad, editor. IGI Global, publisher. (Original) (DLC)2018050686 Print version: 1522583041 9781522583042 (DLC) 2018050686 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2 Volltext |
spellingShingle | Developments in information security and cybernetic wars Chapter 1. On cyber crimes and cyber security -- Chapter 2. Artificial intelligence and big data analytics in support of cyber defense -- Chapter 3. A strategic decision-making framework in cyberspace -- Chapter 4. The opportunities for a national cyber strategy and social media in the rhizome networks -- Chapter 5. Building blocks and measurement of national cyberpower -- Chapter 6. Detecting ddos attacks on multiple network hosts: advanced pattern detection method for the identification of intelligent botnet attacks -- Chapter 7. The evolution of cyber warfare in information operations targeting Estonia, the U.S., and Ukraine -- Chapter 8. The new front line (enhanced): updating the concept of enemy in the onlife age -- Chapter 9. Big data analysis for terroristic behavior identification and study using social networks: illegal armed groups during the conflict in Donbas Region (East Ukraine) -- Chapter 10. Russian information warfare and 9/11 conspiracism: when fake news meets false prophecy -- Chapter 11. The double edge of the information sword -- Chapter 12. Positive vs. negative emotions and network size: an exploratory study of twitter users. Computer security. Cyberterrorism. |
title | Developments in information security and cybernetic wars |
title_auth | Developments in information security and cybernetic wars |
title_exact_search | Developments in information security and cybernetic wars |
title_full | Developments in information security and cybernetic wars Muhammad Sarfraz, editor. |
title_fullStr | Developments in information security and cybernetic wars Muhammad Sarfraz, editor. |
title_full_unstemmed | Developments in information security and cybernetic wars Muhammad Sarfraz, editor. |
title_short | Developments in information security and cybernetic wars |
title_sort | developments in information security and cybernetic wars |
topic | Computer security. Cyberterrorism. |
topic_facet | Computer security. Cyberterrorism. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2 |
work_keys_str_mv | AT sarfrazmuhammad developmentsininformationsecurityandcyberneticwars AT igiglobal developmentsininformationsecurityandcyberneticwars |