Cyberwarefare : (Record no. 251007)

000 -LEADER
fixed length control field 02443nam a22003135i 4500
003 - CONTROL NUMBER IDENTIFIER
control field TH-BaBU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210607164230.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180529s2020 maua| b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781630815769
Qualifying information online
International Standard Book Number 9781630815783
Qualifying information online
040 ## - CATALOGING SOURCE
Original cataloging agency Th-BaBU
Transcribing agency TH-BaBU
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15.C97
Item number P672C 2020
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Porche, Isaac,
Dates associated with a name 1968-,
Relator term author
245 10 - TITLE STATEMENT
Title Cyberwarefare :
Remainder of title an introduction to information-age conflict /
Statement of responsibility, etc. Issac R. Porche III
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boston :
Name of producer, publisher, distributor, manufacturer Artech House,
Date of production, publication, distribution, manufacture, or copyright notice 2020
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Artech House Intelligence and Information Operations Series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
Topical term or geographic name entry element Cyberspace operations (Military science)
Topical term or geographic name entry element Cyber intelligence (Computer security)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Artech House Intelligence and Information Operations Series
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2450267">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2450267</a>
Public note Electronic Resources
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-Book

No items available.


- Copyright © 2022 Library and Learning Space -

Powered by Koha