Terrorism in cyberspace: the next generation
Terrorism enters cyberspace -- Narrowcasting -- Lone wolves in cyberspace -- The e-marketing of terror -- Debates online -- Online fatwas -- Terror on social media -- Cyberterrorism -- Countermeasures : noise and the M.U.D. model -- The war of narratives -- Challenging civil liberties
Autor principal: | |
---|---|
Otros Autores: | |
Tipo de documento: | Print Libro |
Lenguaje: | Inglés |
Publicado: |
Washington, DC
Woodrow Wilson Center Press
2015
New York Columbia University Press 2015 |
En: | Año: 2015 |
Acceso en línea: |
Book review (H-Net) Inhaltsverzeichnis (Verlag) Klappentext (Verlag) |
Disponibilidad en Tübingen: | Disponible en Tübingen. UB: KB 20 A 7427 |
Verificar disponibilidad: | HBZ Gateway |
Servicio de pedido Subito: | Pedir ahora. |
Palabras clave: |
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | 802098533 | ||
003 | DE-627 | ||
005 | 20250219131028.0 | ||
007 | tu | ||
008 | 141111s2015 xxu||||| 00| ||eng c | ||
010 | |a 2014042761 | ||
020 | |a 9780231704496 |c paper |9 978-0-231-70449-6 | ||
020 | |a 9780231704489 |c cloth |9 978-0-231-70448-9 | ||
024 | 3 | |a 9780231704496 | |
035 | |a (DE-627)802098533 | ||
035 | |a (DE-576)429181086 | ||
035 | |a (DE-599)GBV802098533 | ||
035 | |a (OCoLC)908612104 | ||
035 | |a (OCoLC)908612104 | ||
035 | |a (DE-615)00965071 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XD-US | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.325 |q LOC |2 23 | |
084 | |a RQ |2 fivr | ||
084 | |a SC |2 fivs | ||
084 | |a SI03.02 |2 fivs | ||
084 | |a 2 |2 ssgn | ||
084 | |a 2,1 |2 ssgn | ||
084 | |a MD 8920 |2 rvk |0 (DE-625)rvk/122569: | ||
084 | |a 86.41 |2 bkl | ||
084 | |a 89.58 |2 bkl | ||
084 | |a 05.38 |2 bkl | ||
090 | |a a | ||
100 | 1 | |a Weimann, Gabriel |d 1950- |e VerfasserIn |0 (DE-588)131824376 |0 (DE-627)515629219 |0 (DE-576)166741558 |4 aut | |
109 | |a Weimann, Gabriel 1950- |a Ṿiman, Gabi 1950- |a Ṿaiman, Gabi 1950- | ||
245 | 1 | 0 | |a Terrorism in cyberspace |b the next generation |c Gabriel Weimann. [Foreword by Bruce Hoffman] |
264 | 1 | |a Washington, DC |b Woodrow Wilson Center Press |c 2015 | |
264 | 1 | |a New York |b Columbia University Press |c 2015 | |
300 | |a XVII, 296 S. |b graph. Darst. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Literaturverz.: S. 255 - 281 | ||
505 | 8 | |a Terrorism enters cyberspaceNarrowcasting -- Lone wolves in cyberspace -- The e-marketing of terror -- Debates online -- Online fatwas -- Terror on social media -- Cyberterrorism -- Countermeasures : noise and the M.U.D. model -- The war of narratives -- Challenging civil liberties. | |
520 | |a Terrorism enters cyberspace -- Narrowcasting -- Lone wolves in cyberspace -- The e-marketing of terror -- Debates online -- Online fatwas -- Terror on social media -- Cyberterrorism -- Countermeasures : noise and the M.U.D. model -- The war of narratives -- Challenging civil liberties | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SSG |x XA-DE-BW |2 pdager |5 DE-21 | |
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Terrorism | |
650 | 0 | 7 | |0 (DE-588)4164679-4 |0 (DE-627)104330716 |0 (DE-576)209890088 |a Kollektive Sicherheit |2 gnd |
650 | 0 | 7 | |0 (DE-588)7668529-9 |0 (DE-627)606174591 |0 (DE-576)309418054 |a Bedrohungsvorstellung |2 gnd |
650 | 0 | 7 | |0 (DE-588)4026926-7 |0 (DE-627)106286609 |0 (DE-576)208968547 |a Informationstechnik |2 gnd |
650 | 0 | 7 | |0 (DE-588)4031888-6 |0 (DE-627)106263714 |0 (DE-576)208994688 |a Kommunikationstechnik |2 gnd |
650 | 0 | 7 | |0 (DE-588)4308416-3 |0 (DE-627)123816106 |0 (DE-576)211106267 |a Internet |2 gnd |
650 | 0 | 7 | |0 (DE-588)1118882725 |0 (DE-627)872358631 |0 (DE-576)479682461 |a Cyberterrorismus |2 gnd |
650 | 0 | 7 | |0 (DE-588)4461975-3 |0 (DE-627)230760716 |0 (DE-576)212626051 |a Information warfare |2 gnd |
650 | 0 | 7 | |0 (DE-588)4026899-8 |0 (DE-627)104653795 |0 (DE-576)20896844X |a Information |2 gnd |
650 | 0 | 7 | |0 (DE-588)4054790-5 |0 (DE-627)106161075 |0 (DE-576)209110589 |a Sicherheit |2 gnd |
650 | 0 | 7 | |0 (DE-588)4010452-7 |0 (DE-627)106357816 |0 (DE-576)208888128 |a Computerkriminalität |2 gnd |
650 | 0 | 7 | |0 (DE-588)4445317-6 |0 (DE-627)225652358 |0 (DE-576)212357328 |a Gegenmaßnahme |2 gnd |
650 | 0 | 7 | |0 (DE-588)4000230-5 |0 (DE-627)106401785 |0 (DE-576)208837353 |a Abschreckung |2 gnd |
650 | 0 | 7 | |0 (DE-588)4113450-3 |0 (DE-627)105829390 |0 (DE-576)209476583 |a Entwicklung |2 gnd |
650 | 0 | 7 | |0 (DE-588)4294453-3 |0 (DE-627)104183446 |0 (DE-576)210961228 |a Tendenz |2 gnd |
651 | 7 | |0 (DE-588)1135962553 |0 (DE-627)890988382 |0 (DE-576)490197698 |a Erde |2 gnd | |
689 | 0 | 0 | |d s |0 (DE-588)4059534-1 |0 (DE-627)106143212 |0 (DE-576)209131136 |a Terrorismus |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4308416-3 |0 (DE-627)123816106 |0 (DE-576)211106267 |a Internet |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Hoffman, Bruce |d 1954- |e VerfasserIn eines Vorworts |0 (DE-588)1057559121 |0 (DE-627)796049378 |0 (DE-576)164863176 |4 wpr | |
776 | 1 | |z 9780231801362 |c ebook | |
787 | 0 | 8 | |i Rezensiert in |a Shaffer, Ryan, 1982 - |t Technology’s impact on war and terrorism |d 2020 |w (DE-627)1837925348 |
856 | 4 | 2 | |u http://www.h-net.org/reviews/showrev.php?id=44809 |v 2016-07-13 |x Verlag |y Book review (H-Net) |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz429181086inh.htm |m B:DE-576;DE-21 |q application/pdf |v 20150610190113 |x Verlag |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz429181086kla.htm |m B:DE-576;DE-21 |q application/pdf |v 20150610190113 |x Verlag |3 Klappentext |
935 | |i sf | ||
935 | |i Blocktest | ||
936 | r | v | |a MD 8920 |b Terror, Gewalt, Mord |k Politologie |k Politische Theorie, Grundbegriffe des Politischen |k Politische Auseinandersetzung |k Terror, Gewalt, Mord |0 (DE-627)1271426560 |0 (DE-625)rvk/122569: |0 (DE-576)201426560 |
936 | b | k | |a 86.41 |j Kriminologie |0 (DE-627)181572001 |
936 | b | k | |a 89.58 |j Politische Gewalt |0 (DE-627)106416960 |
936 | b | k | |a 05.38 |j Neue elektronische Medien |x Kommunikationswissenschaft |0 (DE-627)106419579 |
936 | f | i | |0 (DE-627)1756134707 |a RQ |b Weltweit |k Weltweit |2 fivr |
936 | f | i | |0 (DE-627)1756135363 |a SC |b Internationale Sicherheit/Verteidigung |k Internationale Sicherheit/Verteidigung |2 fivs |
936 | f | i | |0 (DE-627)1756136386 |a SI03.02 |b Informationstechnologie |k Technik |k Technikzweige |k Informationstechnologie |2 fivs |
938 | 1 | 0 | |0 (DE-627)1756180598 |0 (DE-615)6608724 |a Global |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756233098 |0 (DE-615)6601168 |a Internationale Sicherheit |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756207607 |0 (DE-615)6608867 |a Bedrohungsvorstellungen (Sicherheitspolitik) |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756170568 |0 (DE-615)6606610 |a Informations-/Kommunikationstechnologie |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756176671 |0 (DE-615)6603660 |a Internet |2 fivt |
938 | 1 | 0 | |0 (DE-627)175619145X |0 (DE-615)6609551 |a Cyberterrorismus |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756194688 |0 (DE-615)6602727 |a Informationskriegführung |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756235201 |0 (DE-615)6604688 |a Informationssicherheit |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756193525 |0 (DE-615)6608795 |a Computerkriminalität |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756241163 |0 (DE-615)6607902 |a Gegenmaßnahme |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756235813 |0 (DE-615)6608386 |a Abschreckung/Abschreckungsstrategie |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756180512 |0 (DE-615)6608343 |a Entwicklungsperspektive und -tendenz |2 fivt |
938 | 1 | 1 | |0 (DE-627)175618979X |0 (DE-615)6607250 |a Illegale Aktivität |2 fiva |
938 | 1 | 1 | |0 (DE-627)1756174644 |0 (DE-615)6607911 |a Internationaler Akteur |2 fiva |
938 | 1 | 1 | |0 (DE-627)1756192928 |0 (DE-615)6609116 |a Organisierte Kriminalität |2 fiva |
938 | 1 | 1 | |0 (DE-627)1756166404 |0 (DE-615)6602633 |a Datensicherheit |2 fiva |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3182211404 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 802098533 | ||
LOK | |0 005 20150602154346 | ||
LOK | |0 008 150413||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 20 A 7427 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 1506 |f 34 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3182211706 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 802098533 | ||
LOK | |0 005 20150916164558 | ||
LOK | |0 008 150717||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 20 A 7427 |