|
|
|
|
| LEADER |
00000cam a22000002c 4500 |
| 001 |
1865839787 |
| 003 |
DE-627 |
| 005 |
20250121054853.0 |
| 007 |
cr uuu---uuuuu |
| 008 |
231017s2013 xx |||||o 00| ||eng c |
| 035 |
|
|
|a (DE-627)1865839787
|
| 035 |
|
|
|a (DE-599)KXP1865839787
|
| 040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
| 041 |
|
|
|a eng
|
| 084 |
|
|
|a 2,1
|2 ssgn
|
| 100 |
1 |
|
|a Weissbrodt, David
|e VerfasserIn
|4 aut
|
| 245 |
1 |
0 |
|a Cyber-Conflict, Cyber-Crime, and Cyber-Espionage
|
| 264 |
|
1 |
|c 2013
|
| 336 |
|
|
|a Text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
| 338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
| 520 |
|
|
|a Computers and the Internet have changed and are continuing to change the way governments, militaries, businesses, and other organs of society manage their activities. While computers can improve efficiency, they are vulnerable to cyber-attack, cyber-crime, and cyber-espionage. 1 The international community, states, and businesses are still adapting to the unique set of challenges posed by cyber-attack, cyber-crime, and cyber-espionage. States are creating military operations that specialize in cyber-attack and defense to adapt to these relatively new threats to national security operations.
|
| 856 |
4 |
0 |
|u https://core.ac.uk/download/217200676.pdf
|x Verlag
|z kostenfrei
|3 Volltext
|7 0
|
| 935 |
|
|
|a mkri
|
| 951 |
|
|
|a BO
|
| ELC |
|
|
|a 1
|
| LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
| LOK |
|
|
|0 001 4390878182
|
| LOK |
|
|
|0 003 DE-627
|
| LOK |
|
|
|0 004 1865839787
|
| LOK |
|
|
|0 005 20231017043715
|
| LOK |
|
|
|0 008 231017||||||||||||||||ger|||||||
|
| LOK |
|
|
|0 035
|a (DE-2619)CORE63216886
|
| LOK |
|
|
|0 040
|a DE-2619
|c DE-627
|d DE-2619
|
| LOK |
|
|
|0 092
|o n
|
| LOK |
|
|
|0 852
|a DE-2619
|
| LOK |
|
|
|0 852 1
|9 00
|
| LOK |
|
|
|0 935
|a core
|
| LOK |
|
|
|0 939
|a 17-10-23
|b l01
|
| OAS |
|
|
|a 1
|
| ORI |
|
|
|a SA-MARC-krimdoka001.raw
|