|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
619772751 |
003 |
DE-627 |
005 |
20230426141637.0 |
007 |
tu |
008 |
100224s2010 xxu||||| 00| ||eng c |
010 |
|
|
|a 2010483229
|
016 |
7 |
|
|a 015483176
|2 UK
|
020 |
|
|
|a 0061962236
|c £16.99 (hbk.)
|9 0-06-196223-6
|
020 |
|
|
|a 9780061962233
|c £16.99 (hbk.)
|9 978-0-06-196223-3
|
035 |
|
|
|a (DE-627)619772751
|
035 |
|
|
|a (DE-576)324860471
|
035 |
|
|
|a (DE-599)GBV619772751
|
035 |
|
|
|a (OCoLC)699697374
|
035 |
|
|
|a (OCoLC)699697374
|
035 |
|
|
|a (DE-615)00344610
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XD-US
|
050 |
|
0 |
|a HV6773.2
|
082 |
0 |
|
|a 355.3/43
|q LOC
|2 22
|
084 |
|
|
|a RC02
|2 fivr
|
084 |
|
|
|a SC02
|2 fivs
|
084 |
|
|
|a SI03.02
|2 fivs
|
084 |
|
|
|a 7,26
|2 ssgn
|
084 |
|
|
|a 89.90
|2 bkl
|
084 |
|
|
|a 89.58
|2 bkl
|
084 |
|
|
|a 89.83
|2 bkl
|
100 |
1 |
|
|a Clarke, Richard A.
|d 1951-
|0 (DE-588)129083453
|0 (DE-627)388713631
|0 (DE-576)187785511
|4 aut
|
109 |
|
|
|a Clarke, Richard A. 1951-
|a Ḳlarḳ, Ritsʹard A. 1951-
|a Clarke, Richard Alan 1951-
|a Clarke, Richard 1951-
|
245 |
1 |
0 |
|a Cyber war
|b the next threat to national security and what to do about it
|c Richard A. Clarke and Robert K. Knake
|
250 |
|
|
|a 1. ed
|
264 |
|
1 |
|a New York, NY
|b Ecco
|c 2010
|
300 |
|
|
|a XIV, 290 S
|c 23 cm
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
650 |
|
0 |
|a Cyberterrorism
|z United States
|
650 |
|
0 |
|a Information warfare
|z United States
|
650 |
|
0 |
|a Cyberterrorism
|z United States
|x Prevention
|
650 |
|
0 |
|a Information warfare
|z United States
|x Prevention
|
650 |
|
0 |
|a Cyberspace operations (Military science)
|z United States
|
650 |
0 |
7 |
|0 (DE-588)4116489-1
|0 (DE-627)104325224
|0 (DE-576)209502010
|a Sicherheitspolitik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4073817-6
|0 (DE-627)10609145X
|0 (DE-576)209191597
|a Kriegführung
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4059787-8
|0 (DE-627)106142275
|0 (DE-576)209132256
|a Theorie
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4026926-7
|0 (DE-627)106286609
|0 (DE-576)208968547
|a Informationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4031888-6
|0 (DE-627)106263714
|0 (DE-576)208994688
|a Kommunikationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4461975-3
|0 (DE-627)230760716
|0 (DE-576)212626051
|a Information warfare
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)7668529-9
|0 (DE-627)606174591
|0 (DE-576)309418054
|a Bedrohungsvorstellung
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4129808-1
|0 (DE-627)105707236
|0 (DE-576)209613610
|a Kriegsziel
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4260091-1
|0 (DE-627)104643994
|0 (DE-576)210586478
|a Schutzvorrichtung
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4003846-4
|0 (DE-627)10438896X
|0 (DE-576)208852972
|a Außenpolitik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4057952-9
|0 (DE-627)106149075
|0 (DE-576)209124202
|a Strategie
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4054790-5
|0 (DE-627)106161075
|0 (DE-576)209110589
|a Sicherheit
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4204973-8
|0 (DE-627)105139254
|0 (DE-576)210165766
|a Konzeption
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4117713-7
|0 (DE-627)105797111
|0 (DE-576)209512253
|a Ziel
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4209283-8
|0 (DE-627)104353201
|0 (DE-576)210191112
|a Einflussgröße
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4114030-8
|0 (DE-627)104713364
|0 (DE-576)20948134X
|a Instrument
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4113450-3
|0 (DE-627)105829390
|0 (DE-576)209476583
|a Entwicklung
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4294453-3
|0 (DE-627)104183446
|0 (DE-576)210961228
|a Tendenz
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4078704-7
|0 (DE-627)106076612
|0 (DE-576)209209682
|a Usa
|2 gnd
|
689 |
0 |
0 |
|d s
|0 (DE-588)4461975-3
|0 (DE-627)230760716
|0 (DE-576)212626051
|a Information warfare
|2 gnd
|
689 |
0 |
1 |
|d s
|0 (DE-588)4129475-0
|0 (DE-627)105709603
|0 (DE-576)209610816
|a Elektronische Kampfführung
|2 gnd
|
689 |
0 |
2 |
|d s
|0 (DE-588)4010452-7
|0 (DE-627)106357816
|0 (DE-576)208888128
|a Computerkriminalität
|2 gnd
|
689 |
0 |
3 |
|d s
|0 (DE-588)4112701-8
|0 (DE-627)104321679
|0 (DE-576)209470127
|a Bekämpfung
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Knake, Robert K.
|0 (DE-588)143778897
|0 (DE-627)654720703
|0 (DE-576)338874542
|4 aut
|
856 |
4 |
2 |
|u http://www.gbv.de/dms/goettingen/619772751.pdf
|m V:DE-601
|m B:DE-7
|q pdf/application
|v 2011-12-26
|x Verlag
|y Inhaltsverzeichnis
|3 Inhaltsverzeichnis
|
935 |
|
|
|a mkri
|
935 |
|
|
|i Blocktest
|
936 |
b |
k |
|a 89.90
|j Außenpolitik
|j Internationale Politik
|0 (DE-627)10642047X
|
936 |
b |
k |
|a 89.58
|j Politische Gewalt
|0 (DE-627)106416960
|
936 |
b |
k |
|a 89.83
|j Kriegführung
|0 (DE-627)106407783
|
936 |
f |
i |
|0 (DE-627)175613233X
|a RC02
|b Vereinigte Staaten
|k Nordamerika (ohne Mexiko)
|k Vereinigte Staaten
|2 fivr
|
936 |
f |
i |
|0 (DE-627)175613538X
|a SC02
|b Verteidigungs-/Sicherheitspolitik
|k Internationale Sicherheit/Verteidigung
|k Verteidigungs-/Sicherheitspolitik
|2 fivs
|
936 |
f |
i |
|0 (DE-627)1756136386
|a SI03.02
|b Informationstechnologie
|k Technik
|k Technikzweige
|k Informationstechnologie
|2 fivs
|
938 |
1 |
0 |
|0 (DE-627)1756241724
|0 (DE-615)800019592
|a Vereinigte Staaten
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756208441
|0 (DE-615)800531895
|a Verteidigungs- und Sicherheitspolitik
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756235643
|0 (DE-615)800206811
|a Theorie der Kriegführung
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756170568
|0 (DE-615)800000398
|a Informations-/Kommunikationstechnologie
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756194688
|0 (DE-615)800441760
|a Informationskriegführung
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756207607
|0 (DE-615)800283665
|a Bedrohungsvorstellungen (Sicherheitspolitik)
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756145997
|0 (DE-615)800483952
|a Verwundbarkeit von Zielen
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756194920
|0 (DE-615)800520361
|a Nationale Sicherheit
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756223408
|0 (DE-615)800538178
|a Sicherheitsstrategie
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756161356
|0 (DE-615)800353122
|a Bestimmungsfaktoren/Ziele strategischer Konzeption
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756220034
|0 (DE-615)800260681
|a Instrumente der Verteidigungs- und Sicherheitspolitik
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756180512
|0 (DE-615)800680308
|a Entwicklungsperspektive und -tendenz
|2 fivt
|
938 |
1 |
1 |
|0 (DE-627)1756158304
|0 (DE-615)800408435
|a Elektronische Kampfführung
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)175619145X
|0 (DE-615)800004551
|a Cyberterrorismus
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)1756193525
|0 (DE-615)800238442
|a Computerkriminalität
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)1756195137
|0 (DE-615)800366548
|a Spionage
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)175615208X
|0 (DE-615)800280663
|a Zivilbevölkerung
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)1756233098
|0 (DE-615)800178410
|a Internationale Sicherheit
|2 fiva
|
951 |
|
|
|a BO
|
ELC |
|
|
|b 1
|
LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
LOK |
|
|
|0 001 3095915128
|
LOK |
|
|
|0 003 DE-627
|
LOK |
|
|
|0 004 619772751
|
LOK |
|
|
|0 005 20100709094152
|
LOK |
|
|
|0 008 100621||||||||||||||||ger|||||||
|
LOK |
|
|
|0 040
|a DE-Frei85
|c DE-627
|d DE-Frei85
|
LOK |
|
|
|0 852
|a DE-Frei85
|
LOK |
|
|
|0 852 1
|m p
|9 00
|
LOK |
|
|
|0 938
|k p
|
ORI |
|
|
|a SA-MARC-krimdoka001.raw
|