Cyberspace and national security (رقم التسجيلة. 531294)

MARC details
000 -LEADER
fixed length control field 02215cam a2200325 i 4500
001 - CONTROL NUMBER
control field a518704
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111229s2012 xxua 001 0 eng d
009 - PHYSICAL DESCRIPTION FIXED-FIELD FOR ARCHIVAL COLLECTION (VM) [OBSOLETE]
fixed length control field 518704
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781589019188
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1589019180
035 ## - SYSTEM CONTROL NUMBER
System control number 836143475
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging fre
-- eng
Transcribing agency DLC
Modifying agency YDX
-- OCLCO
-- BTCTA
-- BDX
-- ERASA
-- YDXCP
-- UKMGB
-- CDX
-- BWX
-- COO
-- DLC
-- FRAS
Description conventions AFNOR
072 ## - SUBJECT CATEGORY CODE
Subject category code SHS
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355.033
Edition number 23E
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 355
095 ## - 095
a xxu
245 00 - TITLE STATEMENT
Title Cyberspace and national security
Medium [Texte imprimé] :
Remainder of title threats, opportunities, and power in a virtual world /
Statement of responsibility, etc. [edited by] Derek S. Reveron
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Washington :
Name of publisher, distributor, etc. Georgetown University Press,
Date of publication, distribution, etc. c2012
300 ## - PHYSICAL DESCRIPTION
Extent 1 vol. (IX-246 p.) :
Other physical details ill. ;
Dimensions 23 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Notes bibliogr.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note List of illustrations -- Acknowledgments -- Thinking about cyber -- Introduction : national security and cyberspace / Derek S. Reveron -- Speculative security / Patrick Jagoda -- Operational considerations in cyberattack and cyberexploitation / Herbert Lin -- Joining cyber crime and cyber terrorism : a likely scenario / Steven Bucci -- Armed conflict and cyber defense -- Inter arma silent leges redux? : the law of armed conflict and cyber-conflict / David P. Fidler -- The emerging structure of strategic cyber offense, defense, and deterrence / Richard B. Andres -- A new framework for cyber-deterrence / Jeffrey R. Cooper -- Cybered conflict, cyber power, and security resilience as strategy / Chris Demchak -- National approaches to cybersecurity and cyberwar -- Persistent enemies and cyberwar : rivalry relations in an age of information warfare / Brandon Valeriano and Ryan Maness -- Transatlantic cyber / James Joyner -- The bear goes digital : Russia and its cyber capabilities / Nikolas K. Gvosdev -- China in cyberspace / Nigel Inkster -- Toward a theory of cyberpower : strategic purpose in peace and war / John B. Sheldon -- Conclusion / Derek S. Reveron -- About the contributors -- Index
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Cyberterrorism
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term National security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Conflict management
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Reveron, Derek S.
Relator term Ed.
Relationship 340
9 (RLIN) 354162
930 ## - EQUIVALENCE OR CROSS-REFERENCE-UNIFORM TITLE HEADING [LOCAL, CANADA]
Uniform title 518704
931 ## -
-- a518704
990 ## - EQUIVALENCES OR CROSS-REFERENCES [LOCAL, CANADA]
Link information for 9XX fields amiri
المقتنيات
Lost status Source of classification or shelving scheme Damaged status Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
  AUTO   Bibliothèque centrale Bibliothèque centrale En accès libre 04/03/2014 240.41   355 / 863 000004879626 04/03/2014 1 04/03/2014 Livre