Cyber warfare and terrorism concepts, methodologies, tools, and applications

"This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"--

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey, Pennsylvania IGI Global [2020]
Schlagworte:
Online-Zugang:DE-1049
DE-573
DE-898
DE-706
DE-1050
DE-83
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV047027885
003 DE-604
007 cr|uuu---uuuuu
008 201125s2020 |||| o||u| ||||||eng d
020 |a 9781799824671  |9 978-1-79982-467-1 
020 |a 1799824675  |9 1-79982-467-5 
024 7 |a 10.4018/978-1-7998-2466-4  |2 doi 
035 |a (ZDB-1-IGE)00236595 
035 |a (OCoLC)1224481443 
035 |a (DE-599)BVBBV047027885 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1049  |a DE-573  |a DE-898  |a DE-91  |a DE-706  |a DE-1050  |a DE-83 
082 0 |a 363.325  |2 23 
245 1 0 |a Cyber warfare and terrorism  |b concepts, methodologies, tools, and applications  |c [edited by] Information Resources Management Association 
264 1 |a Hershey, Pennsylvania  |b IGI Global  |c [2020] 
300 |a 1 Online-Ressource (3 volumes (1697 Seiten) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Description based on title screen (IGI Global, viewed 04/15/2020) 
520 |a "This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"-- 
650 7 |a Cyberterrorism / Prevention  |2 fast 
650 7 |a Terrorism / Prevention  |2 fast 
650 4 |a Cyberterrorism / Prevention 
650 4 |a Terrorism / Prevention 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1799824667  |z 9781799824664 
912 |a ZDB-1-IGE  |a ZDB-98-IGB 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4  |l DE-1049  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4  |l DE-573  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4  |l DE-898  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4  |l DE-706  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4  |l DE-1050  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4  |l DE-83  |p ZDB-98-IGB  |q TUB_EBS_IGB  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2518599
DE-BY-TUM_local_url http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4
Verlag
_version_ 1816714641894539264
adam_text
adam_txt
any_adam_object
any_adam_object_boolean
building Verbundindex
bvnumber BV047027885
collection ZDB-1-IGE
ZDB-98-IGB
ctrlnum (ZDB-1-IGE)00236595
(OCoLC)1224481443
(DE-599)BVBBV047027885
dewey-full 363.325
dewey-hundreds 300 - Social sciences
dewey-ones 363 - Other social problems and services
dewey-raw 363.325
dewey-search 363.325
dewey-sort 3363.325
dewey-tens 360 - Social problems and services; associations
discipline Soziologie
discipline_str_mv Soziologie
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047027885</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201125s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799824671</subfield><subfield code="9">978-1-79982-467-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799824675</subfield><subfield code="9">1-79982-467-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-2466-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00236595</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1224481443</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047027885</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare and terrorism</subfield><subfield code="b">concepts, methodologies, tools, and applications</subfield><subfield code="c">[edited by] Information Resources Management Association</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (3 volumes (1697 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/15/2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"--</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / Prevention</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1799824667</subfield><subfield code="z">9781799824664</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV047027885
illustrated Not Illustrated
index_date 2024-07-03T16:01:29Z
indexdate 2024-11-25T17:57:35Z
institution BVB
isbn 9781799824671
1799824675
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032435230
oclc_num 1224481443
open_access_boolean
owner DE-1049
DE-573
DE-898
DE-BY-UBR
DE-91
DE-BY-TUM
DE-706
DE-1050
DE-83
owner_facet DE-1049
DE-573
DE-898
DE-BY-UBR
DE-91
DE-BY-TUM
DE-706
DE-1050
DE-83
physical 1 Online-Ressource (3 volumes (1697 Seiten)
psigel ZDB-1-IGE
ZDB-98-IGB
ZDB-98-IGB TUB_EBS_IGB
publishDate 2020
publishDateSearch 2020
publishDateSort 2020
publisher IGI Global
record_format marc
spellingShingle Cyber warfare and terrorism concepts, methodologies, tools, and applications
Cyberterrorism / Prevention fast
Terrorism / Prevention fast
Cyberterrorism / Prevention
Terrorism / Prevention
title Cyber warfare and terrorism concepts, methodologies, tools, and applications
title_auth Cyber warfare and terrorism concepts, methodologies, tools, and applications
title_exact_search Cyber warfare and terrorism concepts, methodologies, tools, and applications
title_exact_search_txtP Cyber warfare and terrorism concepts, methodologies, tools, and applications
title_full Cyber warfare and terrorism concepts, methodologies, tools, and applications [edited by] Information Resources Management Association
title_fullStr Cyber warfare and terrorism concepts, methodologies, tools, and applications [edited by] Information Resources Management Association
title_full_unstemmed Cyber warfare and terrorism concepts, methodologies, tools, and applications [edited by] Information Resources Management Association
title_short Cyber warfare and terrorism
title_sort cyber warfare and terrorism concepts methodologies tools and applications
title_sub concepts, methodologies, tools, and applications
topic Cyberterrorism / Prevention fast
Terrorism / Prevention fast
Cyberterrorism / Prevention
Terrorism / Prevention
topic_facet Cyberterrorism / Prevention
Terrorism / Prevention