|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_ocn934513975 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
160112t20152015dcu ob 000 0 eng d |
010 |
|
|
|a 2021763875
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d YDXCP
|d N$T
|d DID
|d OCLCF
|d CDX
|d IDEBK
|d EBLCP
|d OCLCQ
|d OCLCA
|d TEFOD
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d DLC
|d OCLCO
|d OCLCL
|d TMA
|d OCLCQ
|
019 |
|
|
|a 934743232
|a 934770943
|a 1351935506
|
020 |
|
|
|a 9781442259034
|q (electronic bk.)
|
020 |
|
|
|a 1442259035
|q (electronic bk.)
|
020 |
|
|
|z 9781442259027
|
020 |
|
|
|z 1442259027
|
029 |
1 |
|
|a AU@
|b 000057046117
|
029 |
1 |
|
|a CHNEW
|b 001073326
|
029 |
1 |
|
|a CHVBK
|b 579461238
|
029 |
1 |
|
|a NLGGC
|b 401615561
|
035 |
|
|
|a (OCoLC)934513975
|z (OCoLC)934743232
|z (OCoLC)934770943
|z (OCoLC)1351935506
|
037 |
|
|
|a 887224
|b MIL
|
037 |
|
|
|a E8701D86-03C6-4715-8336-68A9DA396BED
|b OverDrive, Inc.
|n http://www.overdrive.com
|
043 |
|
|
|a a-kn---
|
050 |
|
4 |
|a U163
|
072 |
|
7 |
|a HIS
|x 027130
|2 bisacsh
|
072 |
|
7 |
|a TEC
|x 025000
|2 bisacsh
|
082 |
0 |
4 |
|a 355.4
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jun, Jenny,
|e author.
|
245 |
1 |
0 |
|a North Korea's cyber operations :
|b strategy and responses /
|c authors, Jenny Jun, Scott LaFoy, Ethan Sohn ; project directors, Victor D. Cha, James A. Lewis.
|
264 |
|
1 |
|a Washington, DC :
|b Center for Strategic & International Studies ;
|a Lanham, Maryland :
|b Rowman & Littlefield,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (VIII, 97 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a CSIS reports
|
500 |
|
|
|a "A report of the CSIS Korea Chair."
|
500 |
|
|
|a "December 2015."
|
504 |
|
|
|a Includes bibliographical references (pages 80-93).
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed January 14, 2016).
|
520 |
|
|
|a North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the topic. Existing research is fragmented in pockets of strategic, technical, and policy pieces, though no individual study reaches far enough to create a standard reference document about North Korea's cyber capabilities. This report aims to fill this void, integrating Korean and English language information sources, existing work in each respective field, and creating a foundation for future deeper research.
|
505 |
0 |
|
|a Preface. -- Acknowledgments. -- Abbreviations. -- Introduction. -- Strategic context. -- Organization. -- Future trends and policy recommendations. -- Appendix. -- Bibliography. -- About the project directors and authors.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Cyberspace operations (Military science)
|z Korea (North)
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Cyberguerre (Science militaire)
|z Corée du Nord.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a HISTORY
|x Military
|x Other.
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Military Science.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Cyberspace operations (Military science)
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention
|2 fast
|
651 |
|
7 |
|a Korea (North)
|2 fast
|1 https://id.oclc.org/worldcat/entity/E39QbtfRqdvrCY9mgGQBhg9Y4Y
|
700 |
1 |
|
|a LaFoy, Scott,
|e author.
|
700 |
1 |
|
|a Sohn, Ethan,
|e author.
|
758 |
|
|
|i has work:
|a North Korea's cyber operations (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFDygdWxdd8RWtf4Q9Tkfy
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|z 1442259027
|z 9781442259027
|w (OCoLC)933437798
|
830 |
|
0 |
|a CSIS report.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4332477
|z Texto completo
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 33517224
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4332477
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1140413
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis33517224
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12802145
|
994 |
|
|
|a 92
|b IZTAP
|