NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

The rise of politically motivated cyber attacks : (Record no. 5849)

MARC details
000 -LEADER
fixed length control field 03436cam a22005418i 4500
001 - CONTROL NUMBER
control field 9781003126676
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122831.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210922s2022 enk ob 001 0 eng
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003126676
Qualifying information (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003126677
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000548808
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000548805
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000548839
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 100054883X
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367648695
Qualifying information (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367648701
Qualifying information (paperback)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1269409497
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1269409497
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15.C97
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 079000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 079010
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code JKV
Source bicssc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.325
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Munk, Tine,
Dates associated with a name 1970-
Relator term author.
245 14 - TITLE STATEMENT
Title The rise of politically motivated cyber attacks :
Remainder of title actors, attacks and cybersecurity /
Statement of responsibility, etc. Tine Munk.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Milton Park, Abingdon, Oxon ;
-- New York, NY :
Name of producer, publisher, distributor, manufacturer Routledge,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note The growing online threat. The actors -- Cyber attacks, means and methods -- Cybersecurity and strategies -- Cyberwar and warfare: state and state-sponsored attacks -- Cyberterrorism and ransomware: state-supported groups -- Other politically motivated attacks: political activists and hacktivists.
520 ## - SUMMARY, ETC.
Summary, etc. "This book outlines the complexity in understanding different forms of cyber-attacks, the actors involved, and their motivations. It explores the key challenges in investigating and prosecuting politically motivated cyber-attacks, the lack of consistency within regulatory frameworks, and the grey zone that this creates, for cybercriminals to operate within. Connecting diverse literatures on cyberwarfare, cyberterrorism and cyber-protests, and categorising the different actors involved - state-sponsored/ supported groups, hacktivists, online protestors - the book compares the means and methods used in attacks, the various attackers, and the current strategies employed by cybersecurity agencies. It examines the current legislative framework and proposes ways in which it could be reconstructed, moving beyond the traditional and fragmented definitions used to manage offline violence. The book is an important contribution to the study of cyber-attacks within the areas of criminology, criminal justice, law and policy. It is compelling reading for all those engaged in cybercrime, cyber-security and digital forensics"--
Assigning source Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Political aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Political crimes and offenses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Law and legislation.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Social Aspects / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Social Aspects / Human-Computer Interaction
Source of heading or term bisacsh
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003126676">https://www.taylorfrancis.com/books/9781003126676</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.