MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn649901504
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 090610s2009 dcu ob 000 0 eng d
010 |z  2009930416 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d CNCGM  |d NATAP  |d IDEBK  |d OCLCQ  |d FVL  |d OCLCQ  |d YDXCP  |d OCLCO  |d EBLCP  |d OCLCQ  |d AZK  |d LOA  |d MOR  |d CCO  |d PIFAG  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCA  |d U3W  |d OCLCF  |d STF  |d WRM  |d COCUF  |d NRAMU  |d EZ9  |d ICG  |d VT2  |d CGU  |d WYU  |d MERER  |d TKN  |d DKC  |d OCLCQ  |d UNA  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d QGK  |d OCLCO  |d OCLCL 
019 |a 692282587  |a 722735333  |a 728058787  |a 923280651  |a 961531502  |a 962598661  |a 1149149263  |a 1259140523 
020 |a 0309138515  |q (pdf) 
020 |a 9780309138512  |q (pdf) 
020 |z 0309138507  |q (pbk.) 
020 |z 9780309138505  |q (pbk.) 
020 |a 1282437232 
020 |a 9781282437234 
020 |a 9786612437236 
020 |a 6612437235 
024 8 |a 9786612437236 
029 1 |a AU@  |b 000051345521 
029 1 |a DEBBG  |b BV044108994 
029 1 |a NZ1  |b 13448630 
035 |a (OCoLC)649901504  |z (OCoLC)692282587  |z (OCoLC)722735333  |z (OCoLC)728058787  |z (OCoLC)923280651  |z (OCoLC)961531502  |z (OCoLC)962598661  |z (OCoLC)1149149263  |z (OCoLC)1259140523 
037 |a 243723  |b MIL 
043 |a n-us--- 
050 4 |a U163  |b .T437 2009eb 
082 0 4 |a 355.3/43  |2 22 
049 |a UAMI 
245 0 0 |a Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /  |c William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies. 
260 |a Washington, DC :  |b National Academies Press,  |c ©2009. 
300 |a 1 online resource (xxii, 367 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
505 0 |a Overview, findings, and recommendations -- Technical and operational considerations in cyberattack and cyberexploitation -- A military perspective on cyberattack -- An intelligence community perspective on cyberattack and cyberexploitation -- Perspectives on cyberattack outside national security -- Decision making and oversight -- Legal and ethical perspectives on cyberattack -- Insights from related areas -- Speculations on the dynamics of cyberconflict -- Alternative futures. 
588 0 |a Print version record. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures  |x Government policy  |z United States. 
650 0 |a Computer networks  |x Security measures  |z United States. 
650 0 |a Cyberspace  |x Security measures  |z United States. 
650 0 |a Cyberterrorism  |z United States  |x Prevention. 
650 0 |a Information warfare  |z United States. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |z États-Unis. 
650 6 |a Guerre de l'information  |z États-Unis. 
650 7 |a Cyberspace  |x Security measures  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer networks  |x Security measures  |x Government policy  |2 fast 
650 7 |a Cyberterrorism  |x Prevention  |2 fast 
650 7 |a Information warfare  |2 fast 
651 7 |a United States  |2 fast  |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq 
700 1 |a Dam, Kenneth W.  |1 http://isni.org/isni/0000000383011452 
700 1 |a Lin, Herbert. 
700 1 |a Owens, William A.,  |d 1940-  |1 https://id.oclc.org/worldcat/entity/E39PBJjMwyMdmYFqj69kqjFBT3 
710 2 |a National Research Council (U.S.).  |b Committee on Offensive Information Warfare. 
710 2 |a National Research Council (U.S.).  |b Computer Science and Telecommunications Board. 
710 2 |a National Research Council (U.S.).  |b Division on Engineering and Physical Sciences. 
758 |i has work:  |a Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFKGpCDrYFxdFdMyYpqRcd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities.  |d Washington, DC : National Academies Press, ©2009  |z 9780309138505  |w (DLC) 2009930416  |w (OCoLC)469790873 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3378552  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL3378552 
938 |a ebrary  |b EBRY  |n ebr10355550 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 243723 
938 |a YBP Library Services  |b YANK  |n 3289047 
994 |a 92  |b IZTAP