MARC details
000 -LEADER |
fixed length control field |
06313cam a2200457Ii 4500 |
001 - CONTROL NUMBER |
control field |
ocn864907720 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240726105434.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
131210t20142014nyua ob 001 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
NT |
Language of cataloging |
eng |
Description conventions |
rda |
-- |
pn |
Transcribing agency |
NT |
Modifying agency |
E7B |
-- |
YDXCP |
-- |
CCO |
-- |
NT |
-- |
OCLCO |
-- |
OCLCQ |
-- |
IDEBK |
-- |
EBLCP |
-- |
MHW |
-- |
MEAUC |
-- |
AUD |
-- |
DEBSZ |
-- |
MOR |
-- |
Z5A |
-- |
MERUC |
-- |
OCLCQ |
-- |
SAV |
-- |
OCLCA |
-- |
ZEM |
-- |
OCLCA |
-- |
BAL |
-- |
UUM |
-- |
YDX |
-- |
CEF |
-- |
OCLCQ |
-- |
INT |
-- |
STF |
-- |
OCLCQ |
-- |
WYU |
-- |
TKN |
-- |
AGLDB |
-- |
OCL |
-- |
G3B |
-- |
IGB |
-- |
AUW |
-- |
BTN |
-- |
INTCL |
-- |
SNK |
-- |
DKC |
-- |
OCLCQ |
-- |
NJT |
-- |
OCLCQ |
-- |
TFW |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780199918102 |
Qualifying information |
|
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781306081993 |
043 ## - GEOGRAPHIC AREA CODE |
Geographic area code |
n-us--- |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76 |
Item number |
.C934 2014 |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Singer, P. W. |
Fuller form of name |
(Peter Warren), |
Relator term |
Author |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity and cyberwar : |
Remainder of title |
what everyone needs to know / |
Statement of responsibility, etc. |
P.W. Singer and Allan Friedman. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Oxford : |
Name of publisher, distributor, etc. |
Oxford University Press, |
Date of publication, distribution, etc. |
(c)2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (iii, 306 pages) : |
Other physical details |
illustrations |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
data file |
Source |
rda |
490 1# - SERIES STATEMENT |
Series statement |
What everyone needs to know |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographies and index. |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
INTRODUCTION -- |
Title |
Why Write a Book about Cybersecurity and Cyberwar? -- |
-- |
Why Is There a Cybersecurity Knowledge Gap, and Why Does It Matter? -- |
-- |
How Did You Write the Book and What Do You Hope to Accomplish? -- |
-- |
PART I HOW IT ALL WORKS -- |
-- |
The World Wide What? Defining Cyberspace -- |
-- |
Where Did This "Cyber Stuff" Come from Anyway? A Short History of the Internet -- |
-- |
How Does the Internet Actually Work? -- |
-- |
Who Runs It? Understanding Internet Governance -- |
-- |
On the Internet, How Do They Know Whether You Are a Dog? Identity and Authentication -- |
-- |
What Do We Mean by "Security" Anyway? -- |
-- |
What Are the Threats? -- |
-- |
One Phish, Two Phish, Red Phish, Cyber Phish: What Are Vulnerabilities? -- |
-- |
How Do We Trust in Cyberspace? -- |
-- |
Focus: What Happened in WikiLeaks? -- |
-- |
What Is an Advanced Persistent Threat (APT)? -- |
-- |
How Do We Keep the Bad Guys Out? The Basics of Computer Defense -- |
-- |
Who Is the Weakest Link? Human Factors -- |
-- |
PART II WHY IT MATTERS -- |
-- |
What Is the Meaning of Cyberattack? The Importance of Terms and Frameworks -- |
-- |
Whodunit? The Problem of Attribution -- |
-- |
What Is Hactivism? -- |
-- |
Focus: Who Is Anonymous? -- |
-- |
The Crimes of Tomorrow, Today: What Is Cybercrime? -- |
-- |
Shady RATs and Cyberspies: What Is Cyber Espionage? -- |
-- |
How Afraid Should We Be of Cyberterrorism? -- |
-- |
So How Do Terrorists Actually Use the Web? -- |
-- |
What about Cyber Counterterrorism? -- |
-- |
Security Risk or Human Right? Foreign Policy and the Internet -- |
-- |
Focus: What Is Tor and Why Does Peeling Back the Onion Matter? -- |
-- |
Who Are Patriotic Hackers? -- |
-- |
Focus: What Was Stuxnet? -- |
-- |
What Is the Hidden Lesson of Stuxnet? The Ethics of Cyberweapons -- |
-- |
"Cyberwar, Ugh, What Are Zeros and Ones Good For?": Defining Cyberwar -- |
-- |
A War by Any Other Name? The Legal Side of Cyber Conflict -- |
-- |
What Might a "Cyberwar" Actually Look Like? Computer Network Operations -- |
-- |
Focus: What Is the US Military Approach to Cyberwar? -- |
-- |
Focus: What Is the Chinese Approach to Cyberwar? -- |
-- |
What about Deterrence in an Era of Cyberwar? -- |
-- |
Why Is Threat Assessment So Hard in Cyberspace? -- |
-- |
Does the Cybersecurity World Favor the Weak or the Strong? -- |
-- |
Who Has the Advantage, the Offense or the Defense? -- |
-- |
A New Kind of Arms Race: What Are the Dangers of Cyber Proliferation? -- |
-- |
Are There Lessons from Past Arms Races? -- |
-- |
Behind the Scenes: Is There a Cyber-Industrial Complex? -- |
-- |
PART III WHAT CAN WE DO? -- |
-- |
Don't Get Fooled: Why Can't We Just Build a New, More Secure Internet? -- |
-- |
Rethink Security: What Is Resilience, and Why Is It Important? -- |
-- |
Reframe the Problem (and the Solution): What Can We Learn from Public Health? -- |
-- |
Learn from History: What Can (Real) Pirates Teach Us about Cybersecurity? -- |
-- |
Protect World Wide Governance for the World Wide Web: What Is the Role of International Institutions? -- |
-- |
"Graft" the Rule of Law: Do We Need a Cyberspace Treaty? -- |
-- |
Understand the Limits of the State in Cyberspace: Why Can't the Government Handle It? -- |
-- |
Rethink Government's Role: How Can We Better Organize for Cybersecurity? -- |
-- |
Approach It as a Public-Private Problem: How Do We Better Coordinate Defense? -- |
-- |
Exercise Is Good for You: How Can We Better Prepare for Cyber Incidents? -- |
-- |
Build Cybersecurity Incentives: Why Should I Do What You Want? -- |
-- |
Learn to Share: How Can We Better Collaborate on Information? -- |
-- |
Demand Disclosure: What Is the Role of Transparency? -- |
-- |
Get "Vigorous" about Responsibility: How Can We Create Accountability for Security? -- |
-- |
Find the IT Crowd: How Do We Solve the Cyber People Problem? Do Your Part: How Can I Protect Myself (and the Internet)? -- |
-- |
CONCLUSIONS -- |
-- |
Where Is Cybersecurity Headed Next? -- |
-- |
What Do I Really Need to Know in the End? -- |
-- |
ACKNOWLEDGMENTS -- |
-- |
NOTES -- |
-- |
GLOSSARY -- |
-- |
INDEX. |
520 0# - SUMMARY, ETC. |
Summary, etc. |
A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
Uniform Resource Identifier |
<a href="b">b</a> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
Geographic subdivision |
United States. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures |
Geographic subdivision |
United States. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyberspace |
General subdivision |
Security measures |
Geographic subdivision |
United States. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyberterrorism |
Geographic subdivision |
United States |
General subdivision |
Prevention. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information warfare |
Geographic subdivision |
United States |
General subdivision |
Prevention. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyberspace operations (Military science) |
655 #1 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic Books. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Friedman, Allan. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657629&site=eds-live&custid=s3260518">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657629&site=eds-live&custid=s3260518</a> |
-- |
Click to access digital title | log in using your CIU ID number and my.ciu.edu password |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) |
DONATED BY: |
|
VENDOR |
EBSCO |
Classification part |
QA.. |
PUBLICATION YEAR |
2014 |
LOCATION |
ONLINE |
REQUESTED BY: |
|
-- |
|
-- |
NFIC |
Source of classification or shelving scheme |
|
994 ## - |
-- |
92 |
-- |
NT |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
a |
1 |
b |
Cynthia Snell |
c |
1 |
d |
Cynthia Snell |