Information technology for counterterrorism immediate actions and future possibilities

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Washington, D.C. National Academies Press © 2003
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV043137233
003 DE-604
005 20200303
007 cr|uuu---uuuuu
008 151126s2003 |||| o||u| ||||||eng d
020 |a 0309087368  |9 0-309-08736-8 
020 |a 0309504341  |9 0-309-50434-1 
020 |a 9780309087360  |9 978-0-309-08736-0 
020 |a 9780309504348  |9 978-0-309-50434-8 
035 |a (OCoLC)62391968 
035 |a (DE-599)BVBBV043137233 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 364.142 
110 2 |a National Research Council (U.S.)  |b Committee on the Role of Information Technology in Responding to Terrorism  |e Verfasser  |4 aut 
245 1 0 |a Information technology for counterterrorism  |b immediate actions and future possibilities  |c Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors 
264 1 |a Washington, D.C.  |b National Academies Press  |c © 2003 
300 |a 1 Online-Ressource (xv, 128 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Chairman: John Hennessy 
500 |a Includes bibliographical references 
500 |a Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks 
650 7 |a POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement  |2 bisacsh 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Information technology  |2 fast 
650 7 |a Telecommunication systems  |2 fast 
650 7 |a Terrorism / Prevention  |2 fast 
650 4 |a Terrorismus 
650 4 |a Terrorism  |x Prevention 
650 4 |a Information technology  |z United States 
650 4 |a Computer security  |z United States 
650 4 |a Computer networks  |x Security measures  |z United States 
650 4 |a Telecommunication systems  |z United States 
651 4 |a USA 
700 1 |a Hennessy, John L.  |d 1952-  |e Sonstige  |0 (DE-588)114326436  |4 oth 
700 1 |a Patterson, David A.  |d 1947-  |e Sonstige  |0 (DE-588)114326452  |4 oth 
700 1 |a Lin, Herbert  |d 1952-  |e Sonstige  |0 (DE-588)1179858107  |4 oth 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
999 |a oai:aleph.bib-bvb.de:BVB01-028561423 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019  |l FAW01  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019  |l FAW02  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1804175582507827200
any_adam_object
author_GND (DE-588)114326436
(DE-588)114326452
(DE-588)1179858107
author_corporate National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism
author_corporate_role aut
author_facet National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism
author_sort National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism
building Verbundindex
bvnumber BV043137233
collection ZDB-4-EBA
ctrlnum (OCoLC)62391968
(DE-599)BVBBV043137233
dewey-full 364.142
dewey-hundreds 300 - Social sciences
dewey-ones 364 - Criminology
dewey-raw 364.142
dewey-search 364.142
dewey-sort 3364.142
dewey-tens 360 - Social problems and services; associations
discipline Rechtswissenschaft
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03579nmm a2200577zc 4500</leader><controlfield tag="001">BV043137233</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200303 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309087368</subfield><subfield code="9">0-309-08736-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309504341</subfield><subfield code="9">0-309-50434-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309087360</subfield><subfield code="9">978-0-309-08736-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309504348</subfield><subfield code="9">978-0-309-50434-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62391968</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043137233</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.142</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="b">Committee on the Role of Information Technology in Responding to Terrorism</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology for counterterrorism</subfield><subfield code="b">immediate actions and future possibilities</subfield><subfield code="c">Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, D.C.</subfield><subfield code="b">National Academies Press</subfield><subfield code="c">© 2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 128 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chairman: John Hennessy</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom &amp; Security / Law Enforcement</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication systems</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hennessy, John L.</subfield><subfield code="d">1952-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)114326436</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patterson, David A.</subfield><subfield code="d">1947-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)114326452</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Herbert</subfield><subfield code="d">1952-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1179858107</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=87019</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028561423</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=87019</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=87019</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
geographic USA
geographic_facet USA
id DE-604.BV043137233
illustrated Not Illustrated
indexdate 2024-07-10T07:18:35Z
institution BVB
isbn 0309087368
0309504341
9780309087360
9780309504348
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028561423
oclc_num 62391968
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource (xv, 128 pages)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher National Academies Press
record_format marc
spelling National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism Verfasser aut
Information technology for counterterrorism immediate actions and future possibilities Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors
Washington, D.C. National Academies Press © 2003
1 Online-Ressource (xv, 128 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Chairman: John Hennessy
Includes bibliographical references
Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks
POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh
Computer networks / Security measures fast
Computer security fast
Information technology fast
Telecommunication systems fast
Terrorism / Prevention fast
Terrorismus
Terrorism Prevention
Information technology United States
Computer security United States
Computer networks Security measures United States
Telecommunication systems United States
USA
Hennessy, John L. 1952- Sonstige (DE-588)114326436 oth
Patterson, David A. 1947- Sonstige (DE-588)114326452 oth
Lin, Herbert 1952- Sonstige (DE-588)1179858107 oth
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019 Aggregator Volltext
spellingShingle Information technology for counterterrorism immediate actions and future possibilities
POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh
Computer networks / Security measures fast
Computer security fast
Information technology fast
Telecommunication systems fast
Terrorism / Prevention fast
Terrorismus
Terrorism Prevention
Information technology United States
Computer security United States
Computer networks Security measures United States
Telecommunication systems United States
title Information technology for counterterrorism immediate actions and future possibilities
title_auth Information technology for counterterrorism immediate actions and future possibilities
title_exact_search Information technology for counterterrorism immediate actions and future possibilities
title_full Information technology for counterterrorism immediate actions and future possibilities Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors
title_fullStr Information technology for counterterrorism immediate actions and future possibilities Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors
title_full_unstemmed Information technology for counterterrorism immediate actions and future possibilities Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors
title_short Information technology for counterterrorism
title_sort information technology for counterterrorism immediate actions and future possibilities
title_sub immediate actions and future possibilities
topic POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh
Computer networks / Security measures fast
Computer security fast
Information technology fast
Telecommunication systems fast
Terrorism / Prevention fast
Terrorismus
Terrorism Prevention
Information technology United States
Computer security United States
Computer networks Security measures United States
Telecommunication systems United States
topic_facet POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement
Computer networks / Security measures
Computer security
Information technology
Telecommunication systems
Terrorism / Prevention
Terrorismus
Terrorism Prevention
Information technology United States
Computer security United States
Computer networks Security measures United States
Telecommunication systems United States
USA
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87019
work_keys_str_mv AT nationalresearchcounciluscommitteeontheroleofinformationtechnologyinrespondingtoterrorism informationtechnologyforcounterterrorismimmediateactionsandfuturepossibilities
AT hennessyjohnl informationtechnologyforcounterterrorismimmediateactionsandfuturepossibilities
AT pattersondavida informationtechnologyforcounterterrorismimmediateactionsandfuturepossibilities
AT linherbert informationtechnologyforcounterterrorismimmediateactionsandfuturepossibilities