Threat mitigation and detection of cyber warfare and terrorism activities

"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillan...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Korstanje, Maximiliano 1976- (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey, PA IGI Global, Disseminator of Knowledge [2017]
Schriftenreihe:Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
Schlagworte:
Online-Zugang:DE-12
DE-1050
DE-573
DE-91
DE-706
DE-20
DE-1049
DE-898
DE-83
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV044035401
003 DE-604
005 20180619
007 cr|uuu---uuuuu
008 170209s2017 xxua||| o|||| 00||| eng d
020 |a 9781522519393  |9 978-1-5225-1939-3 
024 7 |a 10.4018/978-1-5225-1938-6  |2 doi 
035 |a (OCoLC)973024539 
035 |a (DE-599)BVBBV044035401 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
044 |a xxu  |c US 
049 |a DE-12  |a DE-706  |a DE-91  |a DE-573  |a DE-1050  |a DE-20  |a DE-1049  |a DE-898  |a DE-83 
050 0 |a U163 
082 0 |a 363.325  |2 23 
245 1 0 |a Threat mitigation and detection of cyber warfare and terrorism activities  |c Maximiliano E. Korstanje (University of Palermo, Argentina) 
264 1 |a Hershey, PA  |b IGI Global, Disseminator of Knowledge  |c [2017] 
264 4 |c © 2017 
300 |a 1 Online-Ressource (xx, 314 Seiten)  |b Illustrationen, Diagramme, Karten 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Advances in information security, privacy, and ethics (AISPE) book series 
490 0 |a Premier reference source 
520 |a "This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"... 
650 4 |a Politik 
650 4 |a Information warfare  |x Prevention 
650 4 |a Cyberspace  |x Security measures 
650 4 |a Cyberterrorism  |x Prevention 
650 4 |a Computer crimes  |x Prevention 
650 4 |a Internet  |x Political aspects 
650 0 7 |a Prävention  |0 (DE-588)4076308-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Cyberterrorismus  |0 (DE-588)1118882725  |2 gnd  |9 rswk-swf 
650 0 7 |a Information warfare  |0 (DE-588)4461975-3  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)4143413-4  |a Aufsatzsammlung  |2 gnd-content 
689 0 0 |a Information warfare  |0 (DE-588)4461975-3  |D s 
689 0 1 |a Cyberterrorismus  |0 (DE-588)1118882725  |D s 
689 0 2 |a Prävention  |0 (DE-588)4076308-0  |D s 
689 0 |5 DE-604 
700 1 |a Korstanje, Maximiliano  |d 1976-  |0 (DE-588)1123743908  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-5225-1938-6 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1-5225-1938-6 
856 4 0 |u https://doi.org/10.4018/978-1-5225-1938-6  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-98-IGB 
912 |a ZDB-1-IGE 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029442554 
966 e |u https://doi.org/10.4018/978-1-5225-1938-6  |l DE-12  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6  |l DE-1050  |p ZDB-98-IGB  |q FHD01_IGB_Kauf  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6  |l DE-573  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6  |l DE-91  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6  |l DE-706  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6  |l DE-20  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6  |l DE-1049  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6  |l DE-898  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6  |l DE-83  |p ZDB-98-IGB  |q TUB_EBS_IGB  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2329362
_version_ 1820858904438898688
any_adam_object
author2 Korstanje, Maximiliano 1976-
author2_role edt
author2_variant m k mk
author_GND (DE-588)1123743908
author_facet Korstanje, Maximiliano 1976-
building Verbundindex
bvnumber BV044035401
callnumber-first U - Military Science
callnumber-label U163
callnumber-raw U163
callnumber-search U163
callnumber-sort U 3163
callnumber-subject U - General Military Science
collection ZDB-98-IGB
ZDB-1-IGE
ctrlnum (OCoLC)973024539
(DE-599)BVBBV044035401
dewey-full 363.325
dewey-hundreds 300 - Social sciences
dewey-ones 363 - Other social problems and services
dewey-raw 363.325
dewey-search 363.325
dewey-sort 3363.325
dewey-tens 360 - Social problems and services; associations
discipline Soziologie
doi_str_mv 10.4018/978-1-5225-1938-6
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03817nam a2200685 c 4500</leader><controlfield tag="001">BV044035401</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180619 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170209s2017 xxua||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522519393</subfield><subfield code="9">978-1-5225-1939-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-1938-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)973024539</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044035401</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat mitigation and detection of cyber warfare and terrorism activities</subfield><subfield code="c">Maximiliano E. Korstanje (University of Palermo, Argentina)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 314 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme, Karten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Korstanje, Maximiliano</subfield><subfield code="d">1976-</subfield><subfield code="0">(DE-588)1123743908</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5225-1938-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-1938-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-1938-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029442554</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)4143413-4 Aufsatzsammlung gnd-content
genre_facet Aufsatzsammlung
id DE-604.BV044035401
illustrated Illustrated
indexdate 2024-12-24T05:41:15Z
institution BVB
isbn 9781522519393
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029442554
oclc_num 973024539
open_access_boolean
owner DE-12
DE-706
DE-91
DE-BY-TUM
DE-573
DE-1050
DE-20
DE-1049
DE-898
DE-BY-UBR
DE-83
owner_facet DE-12
DE-706
DE-91
DE-BY-TUM
DE-573
DE-1050
DE-20
DE-1049
DE-898
DE-BY-UBR
DE-83
physical 1 Online-Ressource (xx, 314 Seiten) Illustrationen, Diagramme, Karten
psigel ZDB-98-IGB
ZDB-1-IGE
ZDB-98-IGB FHD01_IGB_Kauf
ZDB-98-IGB TUB_EBS_IGB
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher IGI Global, Disseminator of Knowledge
record_format marc
series2 Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
spellingShingle Threat mitigation and detection of cyber warfare and terrorism activities
Politik
Information warfare Prevention
Cyberspace Security measures
Cyberterrorism Prevention
Computer crimes Prevention
Internet Political aspects
Prävention (DE-588)4076308-0 gnd
Cyberterrorismus (DE-588)1118882725 gnd
Information warfare (DE-588)4461975-3 gnd
subject_GND (DE-588)4076308-0
(DE-588)1118882725
(DE-588)4461975-3
(DE-588)4143413-4
title Threat mitigation and detection of cyber warfare and terrorism activities
title_auth Threat mitigation and detection of cyber warfare and terrorism activities
title_exact_search Threat mitigation and detection of cyber warfare and terrorism activities
title_full Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje (University of Palermo, Argentina)
title_fullStr Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje (University of Palermo, Argentina)
title_full_unstemmed Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje (University of Palermo, Argentina)
title_short Threat mitigation and detection of cyber warfare and terrorism activities
title_sort threat mitigation and detection of cyber warfare and terrorism activities
topic Politik
Information warfare Prevention
Cyberspace Security measures
Cyberterrorism Prevention
Computer crimes Prevention
Internet Political aspects
Prävention (DE-588)4076308-0 gnd
Cyberterrorismus (DE-588)1118882725 gnd
Information warfare (DE-588)4461975-3 gnd
topic_facet Politik
Information warfare Prevention
Cyberspace Security measures
Cyberterrorism Prevention
Computer crimes Prevention
Internet Political aspects
Prävention
Cyberterrorismus
Information warfare
Aufsatzsammlung
url https://doi.org/10.4018/978-1-5225-1938-6
work_keys_str_mv AT korstanjemaximiliano threatmitigationanddetectionofcyberwarfareandterrorismactivities