Information technology for counterterrorism immediate actions and future possibilities
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Washington, D.C.
National Academies Press
© 2003
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043137233 | ||
003 | DE-604 | ||
005 | 20200303 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2003 |||| o||u| ||||||eng d | ||
020 | |a 0309087368 |9 0-309-08736-8 | ||
020 | |a 0309504341 |9 0-309-50434-1 | ||
020 | |a 9780309087360 |9 978-0-309-08736-0 | ||
020 | |a 9780309504348 |9 978-0-309-50434-8 | ||
035 | |a (OCoLC)62391968 | ||
035 | |a (DE-599)BVBBV043137233 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 364.142 | |
110 | 2 | |a National Research Council (U.S.) |b Committee on the Role of Information Technology in Responding to Terrorism |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information technology for counterterrorism |b immediate actions and future possibilities |c Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors |
264 | 1 | |a Washington, D.C. |b National Academies Press |c © 2003 | |
300 | |a 1 Online-Ressource (xv, 128 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Chairman: John Hennessy | ||
500 | |a Includes bibliographical references | ||
500 | |a Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology |2 fast | |
650 | 7 | |a Telecommunication systems |2 fast | |
650 | 7 | |a Terrorism / Prevention |2 fast | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Terrorism |x Prevention | |
650 | 4 | |a Information technology |z United States | |
650 | 4 | |a Computer security |z United States | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Telecommunication systems |z United States | |
651 | 4 | |a USA | |
700 | 1 | |a Hennessy, John L. |d 1952- |e Sonstige |0 (DE-588)114326436 |4 oth | |
700 | 1 | |a Patterson, David A. |d 1947- |e Sonstige |0 (DE-588)114326452 |4 oth | |
700 | 1 | |a Lin, Herbert |d 1952- |e Sonstige |0 (DE-588)1179858107 |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028561423 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175582507827200 |
---|---|
any_adam_object | |
author_GND | (DE-588)114326436 (DE-588)114326452 (DE-588)1179858107 |
author_corporate | National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism |
author_corporate_role | aut |
author_facet | National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism |
author_sort | National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism |
building | Verbundindex |
bvnumber | BV043137233 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)62391968 (DE-599)BVBBV043137233 |
dewey-full | 364.142 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.142 |
dewey-search | 364.142 |
dewey-sort | 3364.142 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03579nmm a2200577zc 4500</leader><controlfield tag="001">BV043137233</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200303 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309087368</subfield><subfield code="9">0-309-08736-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309504341</subfield><subfield code="9">0-309-50434-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309087360</subfield><subfield code="9">978-0-309-08736-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309504348</subfield><subfield code="9">978-0-309-50434-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62391968</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043137233</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.142</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="b">Committee on the Role of Information Technology in Responding to Terrorism</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology for counterterrorism</subfield><subfield code="b">immediate actions and future possibilities</subfield><subfield code="c">Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, D.C.</subfield><subfield code="b">National Academies Press</subfield><subfield code="c">© 2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 128 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chairman: John Hennessy</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication systems</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hennessy, John L.</subfield><subfield code="d">1952-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)114326436</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patterson, David A.</subfield><subfield code="d">1947-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)114326452</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Herbert</subfield><subfield code="d">1952-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1179858107</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028561423</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043137233 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:35Z |
institution | BVB |
isbn | 0309087368 0309504341 9780309087360 9780309504348 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028561423 |
oclc_num | 62391968 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xv, 128 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | National Academies Press |
record_format | marc |
spelling | National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism Verfasser aut Information technology for counterterrorism immediate actions and future possibilities Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors Washington, D.C. National Academies Press © 2003 1 Online-Ressource (xv, 128 pages) txt rdacontent c rdamedia cr rdacarrier Chairman: John Hennessy Includes bibliographical references Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Computer networks / Security measures fast Computer security fast Information technology fast Telecommunication systems fast Terrorism / Prevention fast Terrorismus Terrorism Prevention Information technology United States Computer security United States Computer networks Security measures United States Telecommunication systems United States USA Hennessy, John L. 1952- Sonstige (DE-588)114326436 oth Patterson, David A. 1947- Sonstige (DE-588)114326452 oth Lin, Herbert 1952- Sonstige (DE-588)1179858107 oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019 Aggregator Volltext |
spellingShingle | Information technology for counterterrorism immediate actions and future possibilities POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Computer networks / Security measures fast Computer security fast Information technology fast Telecommunication systems fast Terrorism / Prevention fast Terrorismus Terrorism Prevention Information technology United States Computer security United States Computer networks Security measures United States Telecommunication systems United States |
title | Information technology for counterterrorism immediate actions and future possibilities |
title_auth | Information technology for counterterrorism immediate actions and future possibilities |
title_exact_search | Information technology for counterterrorism immediate actions and future possibilities |
title_full | Information technology for counterterrorism immediate actions and future possibilities Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors |
title_fullStr | Information technology for counterterrorism immediate actions and future possibilities Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors |
title_full_unstemmed | Information technology for counterterrorism immediate actions and future possibilities Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors |
title_short | Information technology for counterterrorism |
title_sort | information technology for counterterrorism immediate actions and future possibilities |
title_sub | immediate actions and future possibilities |
topic | POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Computer networks / Security measures fast Computer security fast Information technology fast Telecommunication systems fast Terrorism / Prevention fast Terrorismus Terrorism Prevention Information technology United States Computer security United States Computer networks Security measures United States Telecommunication systems United States |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement Computer networks / Security measures Computer security Information technology Telecommunication systems Terrorism / Prevention Terrorismus Terrorism Prevention Information technology United States Computer security United States Computer networks Security measures United States Telecommunication systems United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019 |
work_keys_str_mv | AT nationalresearchcounciluscommitteeontheroleofinformationtechnologyinrespondingtoterrorism informationtechnologyforcounterterrorismimmediateactionsandfuturepossibilities AT hennessyjohnl informationtechnologyforcounterterrorismimmediateactionsandfuturepossibilities AT pattersondavida informationtechnologyforcounterterrorismimmediateactionsandfuturepossibilities AT linherbert informationtechnologyforcounterterrorismimmediateactionsandfuturepossibilities |