Cybersecurity policies and strategies for cyberwarfare prevention

"This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres"..

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Richet, Jean-Loup (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey PA, USA Information Science Reference, an imprint of IGI Global [2015]
Schriftenreihe:Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
Premier reference source
Schlagworte:
Online-Zugang:DE-12
DE-706
DE-20
DE-898
DE-1049
DE-1050
DE-83
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV043854922
003 DE-604
005 20190925
007 cr|uuu---uuuuu
008 161102s2015 xxua||| o|||| 00||| eng d
020 |a 9781466684577  |9 978-1-4666-8457-7 
024 7 |a 10.4018/978-1-4666-8456-0  |2 doi 
035 |a (ZDB-98-IGB)00123849 
035 |a (OCoLC)992824214 
035 |a (DE-599)BVBBV043854922 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
044 |a xxu  |c US 
049 |a DE-12  |a DE-706  |a DE-20  |a DE-898  |a DE-1049  |a DE-1050  |a DE-83 
050 0 |a HV6773.15.C97 
082 0 |a 364.4  |2 23 
084 |a 8  |2 ssgn 
245 1 0 |a Cybersecurity policies and strategies for cyberwarfare prevention  |c Jean-Loup Richet (University of Nantes, France) 
264 1 |a Hershey PA, USA  |b Information Science Reference, an imprint of IGI Global  |c [2015] 
264 4 |c © 2015 
300 |a 1 Online-Ressource (xix, 472 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series 
490 0 |a Premier reference source 
500 |a Includes bibliographical references and index 
520 |a "This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres".. 
650 4 |a Cyberterrorism  |x Prevention 
650 4 |a Cyber intelligence (Computer security) 
650 4 |a Cyberspace operations (Military science) 
650 4 |a Computer crimes  |x Prevention 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Information warfare  |0 (DE-588)4461975-3  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)4143413-4  |a Aufsatzsammlung  |2 gnd-content 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Information warfare  |0 (DE-588)4461975-3  |D s 
689 0 |5 DE-604 
700 1 |a Richet, Jean-Loup  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1-4666-8456-9 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-4666-8456-0 
856 4 0 |u https://doi.org/10.4018/978-1-4666-8456-0  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-98-IGB 
912 |a ZDB-1-IGE 
942 1 1 |c 355.009  |e 22/bsb  |f 090512 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029265145 
966 e |u https://doi.org/10.4018/978-1-4666-8456-0  |l DE-12  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0  |l DE-706  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0  |l DE-20  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0  |l DE-898  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-4666-8456-0  |l DE-1049  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-4666-8456-0  |l DE-1050  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-4666-8456-0  |l DE-83  |p ZDB-98-IGB  |q TUB_EBS_IGB  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819298182616580097
any_adam_object
author2 Richet, Jean-Loup
author2_role edt
author2_variant j l r jlr
author_facet Richet, Jean-Loup
building Verbundindex
bvnumber BV043854922
callnumber-first H - Social Science
callnumber-label HV6773
callnumber-raw HV6773.15.C97
callnumber-search HV6773.15.C97
callnumber-sort HV 46773.15 C97
callnumber-subject HV - Social Pathology, Criminology
collection ZDB-98-IGB
ZDB-1-IGE
ctrlnum (ZDB-98-IGB)00123849
(OCoLC)992824214
(DE-599)BVBBV043854922
dewey-full 364.4
dewey-hundreds 300 - Social sciences
dewey-ones 364 - Criminology
dewey-raw 364.4
dewey-search 364.4
dewey-sort 3364.4
dewey-tens 360 - Social problems and services; associations
discipline Rechtswissenschaft
doi_str_mv 10.4018/978-1-4666-8456-0
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03290nam a2200661 c 4500</leader><controlfield tag="001">BV043854922</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190925 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161102s2015 xxua||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466684577</subfield><subfield code="9">978-1-4666-8457-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-4666-8456-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00123849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992824214</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043854922</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity policies and strategies for cyberwarfare prevention</subfield><subfield code="c">Jean-Loup Richet (University of Nantes, France)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">Information Science Reference, an imprint of IGI Global</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 472 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres"..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Richet, Jean-Loup</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-4666-8456-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4666-8456-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029265145</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-8456-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)4143413-4 Aufsatzsammlung gnd-content
genre_facet Aufsatzsammlung
id DE-604.BV043854922
illustrated Illustrated
indexdate 2024-12-24T05:25:40Z
institution BVB
isbn 9781466684577
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029265145
oclc_num 992824214
open_access_boolean
owner DE-12
DE-706
DE-20
DE-898
DE-BY-UBR
DE-1049
DE-1050
DE-83
owner_facet DE-12
DE-706
DE-20
DE-898
DE-BY-UBR
DE-1049
DE-1050
DE-83
physical 1 Online-Ressource (xix, 472 Seiten) Illustrationen, Diagramme
psigel ZDB-98-IGB
ZDB-1-IGE
ZDB-98-IGB TUB_EBS_IGB
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Information Science Reference, an imprint of IGI Global
record_format marc
series2 Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
Premier reference source
spelling Cybersecurity policies and strategies for cyberwarfare prevention Jean-Loup Richet (University of Nantes, France)
Hershey PA, USA Information Science Reference, an imprint of IGI Global [2015]
© 2015
1 Online-Ressource (xix, 472 Seiten) Illustrationen, Diagramme
txt rdacontent
c rdamedia
cr rdacarrier
Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
Premier reference source
Includes bibliographical references and index
"This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats by examining online criminal networks and threats in both the public and private spheres"..
Cyberterrorism Prevention
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Computer crimes Prevention
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Information warfare (DE-588)4461975-3 gnd rswk-swf
(DE-588)4143413-4 Aufsatzsammlung gnd-content
Computersicherheit (DE-588)4274324-2 s
Information warfare (DE-588)4461975-3 s
DE-604
Richet, Jean-Loup edt
Erscheint auch als Druck-Ausgabe 1-4666-8456-9
Erscheint auch als Druck-Ausgabe 978-1-4666-8456-0
https://doi.org/10.4018/978-1-4666-8456-0 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Cybersecurity policies and strategies for cyberwarfare prevention
Cyberterrorism Prevention
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Computer crimes Prevention
Computersicherheit (DE-588)4274324-2 gnd
Information warfare (DE-588)4461975-3 gnd
subject_GND (DE-588)4274324-2
(DE-588)4461975-3
(DE-588)4143413-4
title Cybersecurity policies and strategies for cyberwarfare prevention
title_auth Cybersecurity policies and strategies for cyberwarfare prevention
title_exact_search Cybersecurity policies and strategies for cyberwarfare prevention
title_full Cybersecurity policies and strategies for cyberwarfare prevention Jean-Loup Richet (University of Nantes, France)
title_fullStr Cybersecurity policies and strategies for cyberwarfare prevention Jean-Loup Richet (University of Nantes, France)
title_full_unstemmed Cybersecurity policies and strategies for cyberwarfare prevention Jean-Loup Richet (University of Nantes, France)
title_short Cybersecurity policies and strategies for cyberwarfare prevention
title_sort cybersecurity policies and strategies for cyberwarfare prevention
topic Cyberterrorism Prevention
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Computer crimes Prevention
Computersicherheit (DE-588)4274324-2 gnd
Information warfare (DE-588)4461975-3 gnd
topic_facet Cyberterrorism Prevention
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Computer crimes Prevention
Computersicherheit
Information warfare
Aufsatzsammlung
url https://doi.org/10.4018/978-1-4666-8456-0
work_keys_str_mv AT richetjeanloup cybersecuritypoliciesandstrategiesforcyberwarfareprevention