|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1120726298 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190923s2019 caua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d GGVRL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
035 |
|
|
|a (OCoLC)1120726298
|
037 |
|
|
|a CL0501000072
|b Safari Books Online
|
050 |
|
4 |
|a U167.5.C92
|
082 |
0 |
4 |
|a 355.41
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Oakley, Jacob G.,
|e author.
|
245 |
1 |
0 |
|a Waging cyber war :
|b technical challenges and operational constraints /
|c Jacob G. Oakley.
|
264 |
|
1 |
|a [California] :
|b Apress,
|c [2019]
|
264 |
|
2 |
|a New York :
|b Distributed to the Book trade worldwide by Springer Science+Business Media New York,
|c [2019]
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed September 20, 2019).
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Chapter 1. Cyber and warfare -- chapter 2. Legal authority -- chapter 3. Cyber exploitation -- chapter 4. Cyber-attack -- chapter 5. Cyber collection -- chapter 6. Enemy attribution -- chapter 7. Targeting -- chapter 8. Access -- chapter 9. Self-attribution -- chapter 10. Association -- chapter 11. Resource resilience -- chapter 12. Control and ownership -- chapter 13. Challenges -- chapter 14. Contemplation.
|
520 |
|
|
|a This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cyberspace operations (Military science)
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Cyberguerre (Science militaire)
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Cyberspace operations (Military science)
|2 fast
|0 (OCoLC)fst01909446
|
650 |
|
7 |
|a Cyberterrorism.
|2 fast
|0 (OCoLC)fst00885802
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484249505/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Gale Cengage Learning
|b GVRL
|n GVRL59TX
|
994 |
|
|
|a 92
|b IZTAP
|