|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn858926165 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
130813s2013 maua ob 001 0 eng d |
010 |
|
|
|a 2013014772
|
040 |
|
|
|a B24X7
|b eng
|e pn
|c B24X7
|d OCLCO
|d UMI
|d COO
|d DEBBG
|d GGVRL
|d DEBSZ
|d YDXCP
|d OCLCQ
|d YDX
|d PHUST
|d LIV
|d OCLCQ
|d OCLCF
|d CEF
|d INT
|d VT2
|d OCLCQ
|d WYU
|d AU@
|d STF
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 868236301
|a 989429661
|a 1055375283
|a 1066050163
|a 1081273922
|a 1103273214
|a 1129357294
|a 1153012081
|a 1192329083
|
020 |
|
|
|a 9780124079267
|
020 |
|
|
|a 0124079261
|
020 |
|
|
|a 0124078141
|
020 |
|
|
|a 9780124078147
|
020 |
|
|
|z 9780124078147
|q (alk. paper)
|
029 |
1 |
|
|a AU@
|b 000053294289
|
029 |
1 |
|
|a DEBBG
|b BV041778299
|
029 |
1 |
|
|a DEBSZ
|b 404327869
|
029 |
1 |
|
|a GBVCP
|b 882722735
|
035 |
|
|
|a (OCoLC)858926165
|z (OCoLC)868236301
|z (OCoLC)989429661
|z (OCoLC)1055375283
|z (OCoLC)1066050163
|z (OCoLC)1081273922
|z (OCoLC)1103273214
|z (OCoLC)1129357294
|z (OCoLC)1153012081
|z (OCoLC)1192329083
|
037 |
|
|
|a CL0500000358
|b Safari Books Online
|
050 |
|
4 |
|a U163
|b .I58 2013eb
|
082 |
0 |
4 |
|a 355.4
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Introduction to cyber-warfare :
|b a multidisciplinary approach /
|c Paulo Shakarian [and others].
|
260 |
|
|
|a Waltham, Mass. :
|b Syngress,
|c ©2013.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Gale virtual reference library
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a I. Cyber attack -- II. Cyber espionage and exploitation -- III. Cyber operations for infrastructure attack.
|
520 |
|
|
|a This book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information warfare
|v Case studies.
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Guerre de l'information
|v Études de cas.
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a HISTORY
|x Military
|x Strategy.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information warfare
|2 fast
|
655 |
|
7 |
|a Case studies
|2 fast
|
700 |
1 |
|
|a Shakarian, Paulo.
|4 aut
|
776 |
0 |
8 |
|i Print version:
|a Shakarian, Paulo.
|t Introduction to cyber-warfare.
|d Amsterdam ; Boston : Syngress, 2013
|z 9780124078147
|w (OCoLC)843025546
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124078147/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00054045
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL6ZWN
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10735319
|
994 |
|
|
|a 92
|b IZTAP
|