000 -LEADER |
fixed length control field |
03038cam a2200397 a 4500 |
001 - CONTROL NUMBER |
control field |
16453663 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
APU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150818175243.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100910s2010 cauab e 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010282512 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBA986688 |
Source |
bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
015361637 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780596802158 (pbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn495466713 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
VPW |
Transcribing agency |
APU |
Modifying agency |
SM |
Language of cataloging |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773 |
Item number |
.C37 2010 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.325 |
Item number |
CAR 2010 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Carr, Jeffrey. |
9 (RLIN) |
22673 |
245 10 - TITLE STATEMENT |
Title |
Inside cyber warfare / |
Statement of responsibility, etc |
Jeffrey Carr ; foreword by Lewis Shepherd. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Sebastopol, Calif. : |
Name of publisher, distributor, etc |
O'Reilly Media, Inc., |
Date of publication, distribution, etc |
c2010. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 212 p. : |
Other physical details |
ill., maps ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
"Mapping the cyber underworld"--Cover. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 2# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Assessing the problem -- The rise of the non-state hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Non-state hackers and the social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policy makers from the field -- Afterword. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009. Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine; discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations; read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival; find out why many attacks originate from servers in the United States, and who's responsible; and, learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level"--Back cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes. |
9 (RLIN) |
3216 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cyberterrorism. |
9 (RLIN) |
12591 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information warfare. |
9 (RLIN) |
22674 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Terrorism. |
9 (RLIN) |
10838 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Shepherd, Lewis. |
9 (RLIN) |
22675 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |