Conquest in cyberspace: national security and information warfare
Main Author: | |
---|---|
Format: | Print Book |
Language: | English |
Published: |
Cambridge [u.a.]
Cambridge Univ. Press
2007
|
In: | Year: 2007 |
Edition: | 1. publ. |
Online Access: |
Contributor biographical information Publisher description Table of contents only |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 51802590X | ||
003 | DE-627 | ||
005 | 20240420231143.0 | ||
007 | tu | ||
008 | 060926s2007 xxk||||| 00| ||eng c | ||
010 | |a 2006030973 | ||
016 | 7 | |a b722493 |2 UK | |
020 | |a 9780521692144 |c : pbk. |9 978-0-521-69214-4 | ||
020 | |a 9780521871600 |c : hardback |9 978-0-521-87160-0 | ||
020 | |a 0521692148 |c (pbk) : £14.99 hbk. : £40.00 : CIP entry (June) |9 0-521-69214-8 | ||
020 | |a 0521871603 |c (hbk.) : £40.00 : £14.99 |9 0-521-87160-3 | ||
024 | 3 | |a 9780521692144 | |
035 | |a (DE-627)51802590X | ||
035 | |a (DE-576)264194195 | ||
035 | |a (DE-599)GBV51802590X | ||
035 | |a (OCoLC)219057393 | ||
035 | |a (OCoLC)237879412 | ||
035 | |a (DE-615)00354112 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XA-GB |c XD-US |c XE-AU | ||
050 | 0 | |a U163 | |
082 | 0 | |a 355.3/43 |q OCLC | |
082 | 0 | |a 355.343 | |
084 | |a RC02 |2 fivr | ||
084 | |a SC05 |2 fivs | ||
084 | |a SI03.02 |2 fivs | ||
084 | |a 3,6 |2 ssgn | ||
084 | |a 89.76 |2 bkl | ||
084 | |a 05.38 |2 bkl | ||
084 | |a 89.58 |2 bkl | ||
100 | 1 | |a Libicki, Martin C. |0 (DE-588)170830373 |0 (DE-627)060969598 |0 (DE-576)131678795 |4 aut | |
109 | |a Libicki, Martin C. |a Libicki, Martin | ||
245 | 1 | 0 | |a Conquest in cyberspace |b national security and information warfare |c Martin C. Libicki |
250 | |a 1. publ. | ||
264 | 1 | |a Cambridge [u.a.] |b Cambridge Univ. Press |c 2007 | |
300 | |a XII, 323 S |b graph. Darst |c 23 cm | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
583 | 1 | |a Archivierung prüfen |c 20200919 |f DE-640 |z 3 |2 pdager | |
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SLG |x XA-DE-BW |z BfZ |2 pdager |5 DE-24 | |
583 | 1 | |a Archivierung prüfen |c 20240324 |f DE-4165 |z 1 |2 pdager | |
650 | 0 | |a Information warfare | |
650 | 0 | |a National Security | |
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Information warfare | |
650 | 4 | |a National Security | |
650 | 4 | |a Cyberterrorism | |
689 | 0 | 0 | |d s |0 (DE-588)4461975-3 |0 (DE-627)230760716 |0 (DE-576)212626051 |a Information warfare |2 gnd |
689 | 0 | |5 (DE-627) | |
856 | 4 | 2 | |u http://www.loc.gov/catdir/toc/ecip071/2006030973.html |x Verlag |y Table of contents only |
856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy0729/2006030973-b.html |x Verlag |y Contributor biographical information |
856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy0729/2006030973-d.html |x Verlag |y Publisher description |
935 | |a mkri | ||
935 | |i Blocktest | ||
936 | b | k | |a 89.76 |j Friedensforschung |j Konfliktforschung |0 (DE-627)106417711 |
936 | b | k | |a 05.38 |j Neue elektronische Medien |x Kommunikationswissenschaft |0 (DE-627)106419579 |
936 | b | k | |a 89.58 |j Politische Gewalt |0 (DE-627)106416960 |
936 | f | i | |0 (DE-627)175613233X |a RC02 |b Vereinigte Staaten |k Nordamerika (ohne Mexiko) |k Vereinigte Staaten |2 fivr |
936 | f | i | |0 (DE-627)1756135428 |a SC05 |b Krieg/Kriegführung |k Internationale Sicherheit/Verteidigung |k Krieg/Kriegführung |2 fivs |
936 | f | i | |0 (DE-627)1756136386 |a SI03.02 |b Informationstechnologie |k Technik |k Technikzweige |k Informationstechnologie |2 fivs |
938 | 1 | 0 | |0 (DE-627)1756241724 |0 (DE-615)6600257 |a Vereinigte Staaten |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756208441 |0 (DE-615)6606080 |a Verteidigungs- und Sicherheitspolitik |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756207607 |0 (DE-615)6608867 |a Bedrohungsvorstellungen (Sicherheitspolitik) |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756170568 |0 (DE-615)6606610 |a Informations-/Kommunikationstechnologie |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756211744 |0 (DE-615)6606454 |a Elektronische Datenverarbeitung |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756204683 |0 (DE-615)6608805 |a Computer |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756166404 |0 (DE-615)6602633 |a Datensicherheit |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756188831 |0 (DE-615)6607834 |a Kritische Infrastrukturen |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756176671 |0 (DE-615)6603660 |a Internet |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756146594 |0 (DE-615)6603611 |a Militärische Kommunikation und Befehlsgebung |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756194688 |0 (DE-615)6602727 |a Informationskriegführung |2 fivt |
938 | 1 | 0 | |0 (DE-627)175613944X |0 (DE-615)6604316 |a Hacken/Hacker |2 fivt |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3109175207 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 51802590X | ||
LOK | |0 005 20070815140714 | ||
LOK | |0 008 070625||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw |