Asia Pacific University Library catalogue


Inside cyber warfare / (Record no. 12202)

000 -LEADER
fixed length control field 03038cam a2200397 a 4500
001 - CONTROL NUMBER
control field 16453663
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150818175243.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100910s2010 cauab e 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010282512
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA986688
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 015361637
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780596802158 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn495466713
040 ## - CATALOGING SOURCE
Original cataloging agency VPW
Transcribing agency APU
Modifying agency SM
Language of cataloging eng
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773
Item number .C37 2010
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.325
Item number CAR 2010
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Carr, Jeffrey.
9 (RLIN) 22673
245 10 - TITLE STATEMENT
Title Inside cyber warfare /
Statement of responsibility, etc Jeffrey Carr ; foreword by Lewis Shepherd.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Sebastopol, Calif. :
Name of publisher, distributor, etc O'Reilly Media, Inc.,
Date of publication, distribution, etc c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 212 p. :
Other physical details ill., maps ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note "Mapping the cyber underworld"--Cover.
500 ## - GENERAL NOTE
General note Includes index.
505 2# - FORMATTED CONTENTS NOTE
Formatted contents note Assessing the problem -- The rise of the non-state hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Non-state hackers and the social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policy makers from the field -- Afterword.
520 ## - SUMMARY, ETC.
Summary, etc "You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009. Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine; discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations; read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival; find out why many attacks originate from servers in the United States, and who's responsible; and, learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level"--Back cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
9 (RLIN) 3216
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism.
9 (RLIN) 12591
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
9 (RLIN) 22674
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Terrorism.
9 (RLIN) 10838
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Shepherd, Lewis.
9 (RLIN) 22675
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Use restrictions Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type
Not Withdrawn Available   Not Damaged No use restrictions Available for loan Book APU Library APU Library Open Shelf 28/03/2014 EMO A114875 | A114875 119.64 2 HV6773 .C37 2010 c.1 00031025 23/07/2024 16/07/2024 1 119.64 28/03/2014 General Circulation