Cybersecurity and cyberwar : (Record no. 100404)

MARC details
000 -LEADER
fixed length control field 06313cam a2200457Ii 4500
001 - CONTROL NUMBER
control field ocn864907720
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240726105434.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131210t20142014nyua ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency NT
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency NT
Modifying agency E7B
-- YDXCP
-- CCO
-- NT
-- OCLCO
-- OCLCQ
-- IDEBK
-- EBLCP
-- MHW
-- MEAUC
-- AUD
-- DEBSZ
-- MOR
-- Z5A
-- MERUC
-- OCLCQ
-- SAV
-- OCLCA
-- ZEM
-- OCLCA
-- BAL
-- UUM
-- YDX
-- CEF
-- OCLCQ
-- INT
-- STF
-- OCLCQ
-- WYU
-- TKN
-- AGLDB
-- OCL
-- G3B
-- IGB
-- AUW
-- BTN
-- INTCL
-- SNK
-- DKC
-- OCLCQ
-- NJT
-- OCLCQ
-- TFW
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780199918102
Qualifying information
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781306081993
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76
Item number .C934 2014
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Singer, P. W.
Fuller form of name (Peter Warren),
Relator term Author
245 10 - TITLE STATEMENT
Title Cybersecurity and cyberwar :
Remainder of title what everyone needs to know /
Statement of responsibility, etc. P.W. Singer and Allan Friedman.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Oxford :
Name of publisher, distributor, etc. Oxford University Press,
Date of publication, distribution, etc. (c)2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (iii, 306 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
490 1# - SERIES STATEMENT
Series statement What everyone needs to know
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographies and index.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note INTRODUCTION --
Title Why Write a Book about Cybersecurity and Cyberwar? --
-- Why Is There a Cybersecurity Knowledge Gap, and Why Does It Matter? --
-- How Did You Write the Book and What Do You Hope to Accomplish? --
-- PART I HOW IT ALL WORKS --
-- The World Wide What? Defining Cyberspace --
-- Where Did This "Cyber Stuff" Come from Anyway? A Short History of the Internet --
-- How Does the Internet Actually Work? --
-- Who Runs It? Understanding Internet Governance --
-- On the Internet, How Do They Know Whether You Are a Dog? Identity and Authentication --
-- What Do We Mean by "Security" Anyway? --
-- What Are the Threats? --
-- One Phish, Two Phish, Red Phish, Cyber Phish: What Are Vulnerabilities? --
-- How Do We Trust in Cyberspace? --
-- Focus: What Happened in WikiLeaks? --
-- What Is an Advanced Persistent Threat (APT)? --
-- How Do We Keep the Bad Guys Out? The Basics of Computer Defense --
-- Who Is the Weakest Link? Human Factors --
-- PART II WHY IT MATTERS --
-- What Is the Meaning of Cyberattack? The Importance of Terms and Frameworks --
-- Whodunit? The Problem of Attribution --
-- What Is Hactivism? --
-- Focus: Who Is Anonymous? --
-- The Crimes of Tomorrow, Today: What Is Cybercrime? --
-- Shady RATs and Cyberspies: What Is Cyber Espionage? --
-- How Afraid Should We Be of Cyberterrorism? --
-- So How Do Terrorists Actually Use the Web? --
-- What about Cyber Counterterrorism? --
-- Security Risk or Human Right? Foreign Policy and the Internet --
-- Focus: What Is Tor and Why Does Peeling Back the Onion Matter? --
-- Who Are Patriotic Hackers? --
-- Focus: What Was Stuxnet? --
-- What Is the Hidden Lesson of Stuxnet? The Ethics of Cyberweapons --
-- "Cyberwar, Ugh, What Are Zeros and Ones Good For?": Defining Cyberwar --
-- A War by Any Other Name? The Legal Side of Cyber Conflict --
-- What Might a "Cyberwar" Actually Look Like? Computer Network Operations --
-- Focus: What Is the US Military Approach to Cyberwar? --
-- Focus: What Is the Chinese Approach to Cyberwar? --
-- What about Deterrence in an Era of Cyberwar? --
-- Why Is Threat Assessment So Hard in Cyberspace? --
-- Does the Cybersecurity World Favor the Weak or the Strong? --
-- Who Has the Advantage, the Offense or the Defense? --
-- A New Kind of Arms Race: What Are the Dangers of Cyber Proliferation? --
-- Are There Lessons from Past Arms Races? --
-- Behind the Scenes: Is There a Cyber-Industrial Complex? --
-- PART III WHAT CAN WE DO? --
-- Don't Get Fooled: Why Can't We Just Build a New, More Secure Internet? --
-- Rethink Security: What Is Resilience, and Why Is It Important? --
-- Reframe the Problem (and the Solution): What Can We Learn from Public Health? --
-- Learn from History: What Can (Real) Pirates Teach Us about Cybersecurity? --
-- Protect World Wide Governance for the World Wide Web: What Is the Role of International Institutions? --
-- "Graft" the Rule of Law: Do We Need a Cyberspace Treaty? --
-- Understand the Limits of the State in Cyberspace: Why Can't the Government Handle It? --
-- Rethink Government's Role: How Can We Better Organize for Cybersecurity? --
-- Approach It as a Public-Private Problem: How Do We Better Coordinate Defense? --
-- Exercise Is Good for You: How Can We Better Prepare for Cyber Incidents? --
-- Build Cybersecurity Incentives: Why Should I Do What You Want? --
-- Learn to Share: How Can We Better Collaborate on Information? --
-- Demand Disclosure: What Is the Role of Transparency? --
-- Get "Vigorous" about Responsibility: How Can We Create Accountability for Security? --
-- Find the IT Crowd: How Do We Solve the Cyber People Problem? Do Your Part: How Can I Protect Myself (and the Internet)? --
-- CONCLUSIONS --
-- Where Is Cybersecurity Headed Next? --
-- What Do I Really Need to Know in the End? --
-- ACKNOWLEDGMENTS --
-- NOTES --
-- GLOSSARY --
-- INDEX.
520 0# - SUMMARY, ETC.
Summary, etc. A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace
General subdivision Security measures
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
Geographic subdivision United States
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information warfare
Geographic subdivision United States
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace operations (Military science)
655 #1 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic Books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Friedman, Allan.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657629&site=eds-live&custid=s3260518">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657629&site=eds-live&custid=s3260518</a>
-- Click to access digital title | log in using your CIU ID number and my.ciu.edu password
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
DONATED BY:
VENDOR EBSCO
Classification part QA..
PUBLICATION YEAR 2014
LOCATION ONLINE
REQUESTED BY:
--
-- NFIC
Source of classification or shelving scheme
994 ## -
-- 92
-- NT
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 1
b Cynthia Snell
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library ONLINE 07/07/2023 EBSCO   QA76.9.25 ocn864907720 07/07/2023 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657629&site=eds-live&custid=s3260518 07/07/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)