|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn828423696 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130225s2012 enka ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d E7B
|d CUS
|d DG1
|d COO
|d HEBIS
|d UMI
|d DEBBG
|d YDXCP
|d EBLCP
|d DEBSZ
|d OCLCQ
|d LOA
|d D6H
|d AZK
|d K6U
|d OCLCQ
|d OCLCO
|d CNNOR
|d DG1
|d OCLCQ
|d MOR
|d LIP
|d PIFFA
|d FVL
|d MERUC
|d OCLCQ
|d OCLCA
|d ZCU
|d CNCGM
|d U3W
|d MERER
|d CUY
|d OCLCQ
|d OCLCF
|d STF
|d WRM
|d CEF
|d ICG
|d INT
|d OCLCQ
|d OCLCA
|d G3B
|d TKN
|d OCLCQ
|d UAB
|d DKC
|d OCLCQ
|d UKAHL
|d OL$
|d OCLCQ
|d VLY
|d OCLCQ
|d OCL
|d OCLCO
|d LUU
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 828299303
|a 875668716
|a 961600118
|a 962702520
|a 969531454
|a 1005085015
|a 1162586788
|
020 |
|
|
|a 9781118562963
|q (electronic bk.)
|
020 |
|
|
|a 1118562968
|q (electronic bk.)
|
020 |
|
|
|a 9781118562666
|
020 |
|
|
|a 1118562666
|
020 |
|
|
|a 9781118562666
|q (electronic bk.)
|
020 |
|
|
|a 9781118562741
|
020 |
|
|
|a 1118562747
|
020 |
|
|
|a 1299188907
|
020 |
|
|
|a 9781299188907
|
020 |
|
|
|z 9781848213500
|
020 |
|
|
|z 1848213506
|
024 |
7 |
|
|a 10.1002/9781118562666
|2 doi
|
029 |
1 |
|
|a AU@
|b 000051629223
|
029 |
1 |
|
|a AU@
|b 000061127807
|
029 |
1 |
|
|a CHBIS
|b 010026791
|
029 |
1 |
|
|a CHNEW
|b 000941304
|
029 |
1 |
|
|a CHVBK
|b 480215790
|
029 |
1 |
|
|a DEBBG
|b BV042032171
|
029 |
1 |
|
|a DEBBG
|b BV044172888
|
029 |
1 |
|
|a DEBSZ
|b 399238093
|
029 |
1 |
|
|a DEBSZ
|b 414176383
|
029 |
1 |
|
|a DEBSZ
|b 431338906
|
029 |
1 |
|
|a NZ1
|b 15915666
|
035 |
|
|
|a (OCoLC)828423696
|z (OCoLC)828299303
|z (OCoLC)875668716
|z (OCoLC)961600118
|z (OCoLC)962702520
|z (OCoLC)969531454
|z (OCoLC)1005085015
|z (OCoLC)1162586788
|
037 |
|
|
|a CL0500000413
|b Safari Books Online
|
050 |
|
4 |
|a HV6773.15.C97
|b C66 2012eb
|
072 |
|
7 |
|a POL
|x 037000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.325/6004678
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cyber conflict :
|b competing national perspectives /
|c edited by Daniel Ventre.
|
260 |
|
|
|a London :
|b ISTE ;
|a Hoboken, NJ :
|b John Wiley & Sons,
|c 2012.
|
300 |
|
|
|a 1 online resource (xxiv, 319 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a ISTE
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Canada's cyber security policy: a tortuous path toward a cyber security strategy / Hugo Loiseau and Lina Lemay --
|t Cuba: towards and active cyber-defense / Daniel Ventre --
|t French perspectives on cyber-conflict / Daniel Ventre --
|t Digital Sparta: information operations and cyber-warfare in Greece / Joseph Fitsanakis --
|t Moving toward and Italian cyber defense and security strategy / Stefania Ducci --
|t Cyberspace in Japan's new defense strategy / Daniel Ventre --
|t Singapore's encounter with information warfare: filtering electronic globalization and military enhancements / Alan Chong --
|t A Slovenian perspective on cyber warfare / Gorazd Praprotnik, Iztok Podbregar, Igor Bernik and Bojan Ticar --
|t A South African perspective on information warfare and cyber warfare / Brett Van Niekerk and Manoj Maharaj -- Conclusion / Daniel Ventre.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information warfare.
|
650 |
|
0 |
|a National security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Guerre de l'information.
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Political Freedom & Security
|x Terrorism.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention
|2 fast
|
650 |
|
7 |
|a Information warfare
|2 fast
|
650 |
|
7 |
|a National security
|2 fast
|
650 |
|
7 |
|a Information warfare
|2 gnd
|
700 |
1 |
|
|a Ventre, Daniel.
|
776 |
0 |
8 |
|i Print version:
|t Cyber conflict.
|d London : ISTE ; Hoboken, NJ : John Wiley & Sons, 2012
|z 9781848213500
|w (DLC) 2012008022
|w (OCoLC)781432111
|
830 |
|
0 |
|a ISTE.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118562741/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24971561
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24971568
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1124641
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10660597
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 536678
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10197056
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10225610
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9984838
|
994 |
|
|
|a 92
|b IZTAP
|