MARC details
000 -LEADER |
fixed length control field |
03771cam a2200397Ii 4500 |
001 - CONTROL NUMBER |
control field |
ocn870988077 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240726105307.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
130811s2012 dcua eob 001 0 eng |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AU@ |
Language of cataloging |
eng |
Description conventions |
rda |
-- |
pn |
Transcribing agency |
AU@ |
Modifying agency |
OCLCO |
-- |
OCLCQ |
-- |
OCLCF |
-- |
CUS |
-- |
YDXCP |
-- |
MHW |
-- |
E7B |
-- |
NT |
-- |
EBLCP |
-- |
UBY |
-- |
JSTOR |
-- |
DEBSZ |
-- |
D6H |
-- |
NHM |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781589019195 |
Qualifying information |
|
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773 |
Item number |
.C934 2012 |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773 |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
MAIN |
245 10 - TITLE STATEMENT |
Title |
Cyberspace and national security : |
Remainder of title |
threats, opportunities, and power in a virtual world / |
Statement of responsibility, etc. |
Derek S. Reveron, editor. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Washington DC : |
Name of publisher, distributor, etc. |
Georgetown University Press, |
Date of publication, distribution, etc. |
(c)2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (ix, 246 pages) : |
Other physical details |
illustration |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
data file |
Source |
rda |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographies and index. |
520 0# - SUMMARY, ETC. |
Summary, etc. |
In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes. |
520 0# - SUMMARY, ETC. |
Summary, etc. |
Scholars, policy analysts, and information technology executives consider current and future cyber threats. They discuss various strategies to advance and defend national interests in cyberspace, contrast the US approach with European and Chinese views, and posit a way of using cyber capabilities in war. Fundamentally, this book establishes a coherent framework to help strategists and policymakers understand the ways in which cyberspace has become a critical new domain for national security. |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part 1. Thinking about cyber. An introduction to national security and cyberspace / |
Statement of responsibility |
Derek S. Reveron ; Speculative security / |
-- |
Patrick Jagoda ; Operational considerations in cyber attack and cyber exploitation / |
-- |
Herbert Lin ; Joining cybercrime and cyberterrorism: a likely scenario / |
-- |
Steven Bucci -- |
Title |
part 2. Armed conflict and cyber defense. Inter arma silent leges Redux? The law of armed conflict and cyber conflict / |
Statement of responsibility |
David P. Fidler ; The emerging structure of strategic cyber offense, cyber defense, and cyber deterrence / |
-- |
Richard B. Andres ; A new framework for cyberdeterrence / |
-- |
Jeffrey R. Cooper ; Cybered conflict, cyber power, and security resilience as strategy / |
-- |
Chris Demchak -- |
Title |
part 3. National approaches to cybersecurity and cyberwar. Persistent enemies and cyberwar: rivalry relations in an age of information warfare / |
Statement of responsibility |
Brandon Valeriano and Ryan Maness ; Competing Transatlantic Visions of Cybersecurity / |
-- |
James Joyner ; The bear goes digital: Russia and its cyber capabilities / |
-- |
Nikolas K. Gvosdev ; China in cyberspace / |
-- |
Nigel Inkster ; Toward a theory of cyber power: strategic purpose in peace and war / |
-- |
John B. Sheldon -- |
Title |
Conclusion / |
Statement of responsibility |
Derek S. Reveron. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
Uniform Resource Identifier |
<a href="b">b</a> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Conflict management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyberterrorism. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
National security. |
655 #1 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic Books. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Reveron, Derek S., |
Relator term |
|
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=491171&site=eds-live&custid=s3260518">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=491171&site=eds-live&custid=s3260518</a> |
-- |
Click to access digital title | log in using your CIU ID number and my.ciu.edu password |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) |
DONATED BY: |
|
VENDOR |
EBSCO |
Classification part |
HV.. |
PUBLICATION YEAR |
2012 |
LOCATION |
ONLINE |
REQUESTED BY: |
|
-- |
|
-- |
NFIC |
Source of classification or shelving scheme |
|
994 ## - |
-- |
92 |
-- |
NT |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
a |
1 |
b |
Cynthia Snell |
c |
1 |
d |
Cynthia Snell |