Cyberspace and national security : (Record no. 95475)

MARC details
000 -LEADER
fixed length control field 03771cam a2200397Ii 4500
001 - CONTROL NUMBER
control field ocn870988077
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240726105307.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130811s2012 dcua eob 001 0 eng
040 ## - CATALOGING SOURCE
Original cataloging agency AU@
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency AU@
Modifying agency OCLCO
-- OCLCQ
-- OCLCF
-- CUS
-- YDXCP
-- MHW
-- E7B
-- NT
-- EBLCP
-- UBY
-- JSTOR
-- DEBSZ
-- D6H
-- NHM
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781589019195
Qualifying information
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773
Item number .C934 2012
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
245 10 - TITLE STATEMENT
Title Cyberspace and national security :
Remainder of title threats, opportunities, and power in a virtual world /
Statement of responsibility, etc. Derek S. Reveron, editor.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Washington DC :
Name of publisher, distributor, etc. Georgetown University Press,
Date of publication, distribution, etc. (c)2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (ix, 246 pages) :
Other physical details illustration
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographies and index.
520 0# - SUMMARY, ETC.
Summary, etc. In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes.
520 0# - SUMMARY, ETC.
Summary, etc. Scholars, policy analysts, and information technology executives consider current and future cyber threats. They discuss various strategies to advance and defend national interests in cyberspace, contrast the US approach with European and Chinese views, and posit a way of using cyber capabilities in war. Fundamentally, this book establishes a coherent framework to help strategists and policymakers understand the ways in which cyberspace has become a critical new domain for national security.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Part 1. Thinking about cyber. An introduction to national security and cyberspace /
Statement of responsibility Derek S. Reveron ; Speculative security /
-- Patrick Jagoda ; Operational considerations in cyber attack and cyber exploitation /
-- Herbert Lin ; Joining cybercrime and cyberterrorism: a likely scenario /
-- Steven Bucci --
Title part 2. Armed conflict and cyber defense. Inter arma silent leges Redux? The law of armed conflict and cyber conflict /
Statement of responsibility David P. Fidler ; The emerging structure of strategic cyber offense, cyber defense, and cyber deterrence /
-- Richard B. Andres ; A new framework for cyberdeterrence /
-- Jeffrey R. Cooper ; Cybered conflict, cyber power, and security resilience as strategy /
-- Chris Demchak --
Title part 3. National approaches to cybersecurity and cyberwar. Persistent enemies and cyberwar: rivalry relations in an age of information warfare /
Statement of responsibility Brandon Valeriano and Ryan Maness ; Competing Transatlantic Visions of Cybersecurity /
-- James Joyner ; The bear goes digital: Russia and its cyber capabilities /
-- Nikolas K. Gvosdev ; China in cyberspace /
-- Nigel Inkster ; Toward a theory of cyber power: strategic purpose in peace and war /
-- John B. Sheldon --
Title Conclusion /
Statement of responsibility Derek S. Reveron.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Conflict management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element National security.
655 #1 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic Books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Reveron, Derek S.,
Relator term
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=491171&site=eds-live&custid=s3260518">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=491171&site=eds-live&custid=s3260518</a>
-- Click to access digital title | log in using your CIU ID number and my.ciu.edu password
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
DONATED BY:
VENDOR EBSCO
Classification part HV..
PUBLICATION YEAR 2012
LOCATION ONLINE
REQUESTED BY:
--
-- NFIC
Source of classification or shelving scheme
994 ## -
-- 92
-- NT
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 1
b Cynthia Snell
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library ONLINE 07/07/2023 EBSCO   HV6773.15.97 ocn870988077 07/07/2023 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=491171&site=eds-live&custid=s3260518 07/07/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)