MARC보기
LDR04316cmm uu200709Ma 4500
001000000300920
003OCoLC
00520230519141955
006m o d
007cr cn|
008120924r20122012paua ob 000 0 eng d
019 ▼a 830532632 ▼a 840129124
020 ▼a 9781780348728 (electronic bk.)
020 ▼a 178034872X (electronic bk.)
020 ▼a 9781615208326 (electronic bk.)
020 ▼a 1615208321 (electronic bk.)
020 ▼a 9781615208319 (electronic bk.)
020 ▼a 1615208313 (electronic bk.)
0291 ▼a NZ1 ▼b 14777080
0291 ▼a AU@ ▼b 000050968863
035 ▼a (OCoLC)811611527
037 ▼a CL0500000202 ▼b Safari Books Online
040 ▼a CREDO ▼b eng ▼c CREDO ▼d OCLCQ ▼d N$T ▼d UIU ▼d OCLCQ ▼d YDXCP ▼d GGVRL ▼d OCLCQ ▼d E7B ▼d OCLCQ ▼d UMI ▼d OCLCQ ▼d WSB ▼d OCLCO ▼d IDEBK ▼d OCLCF ▼d 248032
049 ▼a K4RA
050 4 ▼a HV6773.15.C97 ▼b L39 2012eb
072 7 ▼a POL ▼x 037000 ▼2 bisacsh
08204 ▼a 363.325 ▼2 23
24500 ▼a Law, policy, and technology ▼h [electronic resource] : ▼b cyberterrorism, information warfare, and Internet immobilization / ▼c Pauline C. Reich and Eduardo Gelbstein, editors.
260 ▼a Hershey, Pa. : ▼b Information Science Reference, ▼c c2012.
300 ▼a 1 online resource : ▼b ill.
4900 ▼a Gale virtual reference library
504 ▼a Includes bibliographical references.
5050 ▼a Section 1: Setting the Scene for Cyberterrorism and Other Cyber Attacks. Chapter 1: The Security Practitioners' Perspective; Chapter 2: Economic, Political and Social Threats in the Information Age; Chapter 3 : Critical Information Infrastructure and Cyber-Terrorism; Chapter 4 : Attackers; Chapter 5: Threats, Vulnerability, Uncertainty and Information Risk; Chapter 6: ICT and Security Governance; Chapter 7: Concerns About What Will Happen Next.
5058 ▼a Section 2: Law and Policy Perspectives. Chapter 8: To Define or Not to Define; Chapter 9: Anonymity, Actual Incidents, Cyber Attacks and Digital Immobilization; Chapter 10: Culture Clashes; Chapter 11: What is Cyberterrorism and How Real is the Threat?; Chapter 12: Cyber-Search and Cyber-Seizure; Chapter 13: Terrorism and the Internet.
5058 ▼a Section 3: Case Studies. Chapter 14: Case Study; Chapter 15: China's Cyber Tool; Chapter 16: The United Kingdom's Centre for the Protection of National Infrastructure.
5058 ▼a G-8 initiatives -- Recent Developments -- Calls For A United Nations Treaty -- Appendix: Putting Cyberterrorism Into Context.
5203 ▼a Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
588 ▼a Description based on title page of print version.
650 0 ▼a Cyberterrorism.
650 0 ▼a Computer crimes.
650 0 ▼a Computer security.
650 0 ▼a Cyberspace.
650 0 ▼a Data protection.
650 7 ▼a POLITICAL SCIENCE ▼x Political Freedom & Security ▼x Terrorism. ▼2 bisacsh
650 7 ▼a Computer crimes. ▼2 fast ▼0 (OCoLC)fst00872063
650 7 ▼a Computer security. ▼2 fast ▼0 (OCoLC)fst00872484
650 7 ▼a Cyberspace. ▼2 fast ▼0 (OCoLC)fst00885794
650 7 ▼a Cyberterrorism. ▼2 fast ▼0 (OCoLC)fst00885802
650 7 ▼a Data protection. ▼2 fast ▼0 (OCoLC)fst00887958
655 4 ▼a Electronic books.
7001 ▼a Gelbstein, Eduardo.
7001 ▼a Reich, Pauline C.
77608 ▼i Print version: ▼z 1615208313 ▼z 9781615208319 ▼w (DLC) 2012004590
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=329181
938 ▼a Credo Reference ▼b CRED ▼n 9781780348728
938 ▼a EBSCOhost ▼b EBSC ▼n 329181
938 ▼a YBP Library Services ▼b YANK ▼n 3344158
938 ▼a Cengage Learning ▼b GVRL ▼n GVRL6BAI
938 ▼a Ingram Digital eBook Collection ▼b IDEB ▼n cis24126284
938 ▼a ebrary ▼b EBRY ▼n ebr10618033
990 ▼a 관리자
994 ▼a 92 ▼b K4R