Cyber warfare - truth, tactics, and strategies : (Record no. 383247)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01477nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | APU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20221115221818.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200929s2020 xx o 000 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781839216992 (paperback) : |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | StDuBDS |
Language of cataloging | eng |
Transcribing agency | APU |
Modifying agency | SF |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | U163 |
Item number | ..C86 2020 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Cunningham, Chase, |
9 (RLIN) | 46423 |
245 10 - TITLE STATEMENT | |
Title | Cyber warfare - truth, tactics, and strategies : |
Remainder of title | strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare / |
Statement of responsibility, etc | Dr. Chase Cunningham ; foreword by Gregory J. Touhill. |
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Birmingham, UK : |
Name of producer, publisher, distributor, manufacturer | Packt Publishing, |
Date of production, publication, distribution, manufacture, or copyright notice | c2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | ix, 330 pages : |
Dimensions | 23 cm. |
Other physical details | illustration ; |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Table of ContentsA Brief History of Cyber Threats and the Emergence of the APT DesignatorThe Perimeter Is DeadEmerging Tactics and Trends – What Is Coming?Influence Attacks – Using Social Media Platforms for Malicious PurposesDeepFakes and AI/ML in Cyber SecurityAdvanced Campaigns in Cyber WarfareStrategic Planning for Future Cyber WarfareCyber Warfare Strategic Innovations and Force MultipliersBracing for ImpactSurvivability in Cyber Warfare and Potential Impacts for Failure. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Business enterprises |
General subdivision | Computer networks |
-- | Security measures. |
9 (RLIN) | 46424 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 46425 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Touhill, Gregory J., |
Relator term | writer of supplementary textual content. |
9 (RLIN) | 46426 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Invoice number | Cost, normal purchase price | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Copy number | Cost, replacement price | Price effective from | Koha item type | PO number |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Not Withdrawn | Available | Not Damaged | Available for loan | Book | APU Library | APU Library | Open Shelf | 29/09/2020 | BOOK CHANNEL | IV-0000786 | 143.95 | 1 | 2 | U163 .C86 2020 c.1 | 00012839 | 17/11/2022 | 29/10/2022 | 1 | 143.95 | 29/09/2020 | General Circulation | U-2020/08/1023 |