000 05522cam a2200985 a 4500
001 ocn828423696
003 OCoLC
005 20240523125535.0
006 m o d
007 cr cnu---unuuu
008 130225s2012 enka ob 001 0 eng d
040 _aN$T
_beng
_epn
_cN$T
_dE7B
_dCUS
_dDG1
_dCOO
_dHEBIS
_dUMI
_dDEBBG
_dYDXCP
_dEBLCP
_dDEBSZ
_dOCLCQ
_dLOA
_dD6H
_dAZK
_dK6U
_dOCLCQ
_dOCLCO
_dCNNOR
_dDG1
_dOCLCQ
_dMOR
_dLIP
_dPIFFA
_dFVL
_dMERUC
_dOCLCQ
_dOCLCA
_dZCU
_dCNCGM
_dU3W
_dMERER
_dCUY
_dOCLCQ
_dOCLCF
_dSTF
_dWRM
_dCEF
_dICG
_dINT
_dOCLCQ
_dOCLCA
_dG3B
_dTKN
_dOCLCQ
_dUAB
_dDKC
_dOCLCQ
_dUKAHL
_dOL$
_dOCLCQ
_dVLY
_dOCLCQ
_dOCL
_dOCLCO
_dLUU
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a828299303
_a875668716
_a961600118
_a962702520
_a969531454
_a1005085015
_a1162586788
020 _a9781118562963
_q(electronic bk.)
020 _a1118562968
_q(electronic bk.)
020 _a9781118562666
020 _a1118562666
020 _a9781118562666
_q(electronic bk.)
020 _a9781118562741
020 _a1118562747
020 _a1299188907
020 _a9781299188907
020 _z9781848213500
020 _z1848213506
024 7 _a10.1002/9781118562666
_2doi
029 1 _aAU@
_b000051629223
029 1 _aAU@
_b000061127807
029 1 _aCHBIS
_b010026791
029 1 _aCHNEW
_b000941304
029 1 _aCHVBK
_b480215790
029 1 _aDEBBG
_bBV042032171
029 1 _aDEBBG
_bBV044172888
029 1 _aDEBSZ
_b399238093
029 1 _aDEBSZ
_b414176383
029 1 _aDEBSZ
_b431338906
029 1 _aNZ1
_b15915666
035 _a(OCoLC)828423696
_z(OCoLC)828299303
_z(OCoLC)875668716
_z(OCoLC)961600118
_z(OCoLC)962702520
_z(OCoLC)969531454
_z(OCoLC)1005085015
_z(OCoLC)1162586788
037 _aCL0500000413
_bSafari Books Online
050 4 _aHV6773.15.C97
_bC66 2012eb
072 7 _aPOL
_x037000
_2bisacsh
082 0 4 _a363.325/6004678
_223
049 _aMAIN
245 0 0 _aCyber conflict :
_bcompeting national perspectives /
_cedited by Daniel Ventre.
260 _aLondon :
_bISTE ;
_aHoboken, NJ :
_bJohn Wiley & Sons,
_c2012.
300 _a1 online resource (xxiv, 319 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
490 1 _aISTE
504 _aIncludes bibliographical references and index.
505 0 0 _tCanada's cyber security policy: a tortuous path toward a cyber security strategy / Hugo Loiseau and Lina Lemay --
_tCuba: towards and active cyber-defense / Daniel Ventre --
_tFrench perspectives on cyber-conflict / Daniel Ventre --
_tDigital Sparta: information operations and cyber-warfare in Greece / Joseph Fitsanakis --
_tMoving toward and Italian cyber defense and security strategy / Stefania Ducci --
_tCyberspace in Japan's new defense strategy / Daniel Ventre --
_tSingapore's encounter with information warfare: filtering electronic globalization and military enhancements / Alan Chong --
_tA Slovenian perspective on cyber warfare / Gorazd Praprotnik, Iztok Podbregar, Igor Bernik and Bojan Ticar --
_tA South African perspective on information warfare and cyber warfare / Brett Van Niekerk and Manoj Maharaj -- Conclusion / Daniel Ventre.
588 0 _aPrint version record.
520 _aToday, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational.
546 _aEnglish.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aCyberterrorism
_xPrevention.
650 0 _aCyberspace
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aInformation warfare.
650 0 _aNational security.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 6 _aGuerre de l'information.
650 7 _aPOLITICAL SCIENCE
_xPolitical Freedom & Security
_xTerrorism.
_2bisacsh
650 7 _aCyberspace
_xSecurity measures
_2fast
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aCyberterrorism
_xPrevention
_2fast
650 7 _aInformation warfare
_2fast
650 7 _aNational security
_2fast
650 7 _aInformation warfare
_2gnd
700 1 _aVentre, Daniel.
758 _ihas work:
_aCyber conflict (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGKTMYKf3MxBCXGGyBxMT3
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tCyber conflict.
_dLondon : ISTE ; Hoboken, NJ : John Wiley & Sons, 2012
_z9781848213500
_w(DLC) 2012008022
_w(OCoLC)781432111
830 0 _aISTE.
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118562666
938 _aAskews and Holts Library Services
_bASKH
_nAH24971561
938 _aAskews and Holts Library Services
_bASKH
_nAH24971568
938 _aEBL - Ebook Library
_bEBLB
_nEBL1124641
938 _aebrary
_bEBRY
_nebr10660597
938 _aEBSCOhost
_bEBSC
_n536678
938 _aYBP Library Services
_bYANK
_n10197056
938 _aYBP Library Services
_bYANK
_n10225610
938 _aYBP Library Services
_bYANK
_n9984838
994 _a92
_bINLUM
999 _c11889
_d11889