000 | 03419cam a2200733 i 4500 | ||
---|---|---|---|
001 | ocn875885762 | ||
003 | OCoLC | ||
005 | 20240523125537.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 140407s2014 enka ob 001 0 eng d | ||
040 |
_aDG1 _beng _erda _epn _cDG1 _dOCLCQ _dOCLCF _dYDXCP _dOCLCQ _dHEBIS _dDEBBG _dDG1 _dOCLCQ _dLIP _dOCLCQ _dOCLCO _dOCLCA _dAU@ _dOCLCA _dU3W _dOCLCQ _dOCLCA _dOCLCQ _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
019 |
_a894723577 _a992909655 |
||
020 |
_a9781118898604 _q(electronic bk.) |
||
020 |
_a1118898605 _q(electronic bk.) |
||
024 | 7 |
_a10.1002/9781118898604 _2doi |
|
029 | 1 |
_aAU@ _b000061135313 |
|
029 | 1 |
_aCHBIS _b010441953 |
|
029 | 1 |
_aCHNEW _b000942978 |
|
029 | 1 |
_aCHVBK _b48025382X |
|
029 | 1 |
_aDEBBG _bBV043396664 |
|
029 | 1 |
_aDEBSZ _b415259886 |
|
029 | 1 |
_aDEBSZ _b468874216 |
|
029 | 1 |
_aNZ1 _b15497440 |
|
035 |
_a(OCoLC)875885762 _z(OCoLC)894723577 _z(OCoLC)992909655 |
||
050 | 4 |
_aHV6773 _b.B47 2014 |
|
082 | 0 | 4 |
_a364.16 _223 |
049 | _aMAIN | ||
100 | 1 |
_aBernik, Igor, _eauthor. |
|
245 | 1 | 0 |
_aCybercrime and cyberwarfare / _cIgor Bernik. |
264 | 1 |
_aLondon, UK : _bISTE Ltd ; _aHoboken, NJ : _bJohn Wiley & Sons, Inc., _c2014. |
|
264 | 4 | _c�2014 | |
300 |
_a1 online resource : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 0 | _aFocus series | |
505 | 0 | _aCybercrime / Igor Bernik -- Cyberwarfare / Igor Bernik. | |
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aPrint version record. | |
520 | _aIn order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aComputer crimes. | |
650 | 0 | _aInternet. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 6 | _aCriminalit�e informatique. | |
650 | 6 | _aInternet. | |
650 | 6 |
_aR�eseaux d'ordinateurs _xS�ecurit�e _xMesures. |
|
650 | 7 |
_aInternet. _2aat |
|
650 | 7 |
_aComputer crimes _2fast |
|
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aInternet _2fast |
|
650 | 7 |
_aInternet _2gnd |
|
650 | 7 |
_aComputerkriminalit�at _2gnd |
|
650 | 7 |
_aInformation warfare _2gnd |
|
650 | 7 |
_aComputersicherheit _2gnd |
|
758 |
_ihas work: _aCybercrime and cyber warfare (Text) _1https://id.oclc.org/worldcat/entity/E39PCFyMttDPgCVRCpVp9PtfHK _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aBernik, Igor. _tCybercrime and cyberwarfare _z9781848216716 _w(DLC) 2013952661 _w(OCoLC)871063256 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118898604 |
938 |
_aYBP Library Services _bYANK _n11605637 |
||
938 |
_aYBP Library Services _bYANK _n11675135 |
||
938 |
_aYBP Library Services _bYANK _n12888505 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12079 _d12079 |