Understanding cyber warfare : (Record no. 124936)

MARC details
000 -LEADER
fixed length control field 02965cam a2200421 i 4500
001 - CONTROL NUMBER
control field 20601419
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220222112327.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180726s2019 enk b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2018035740
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138640627 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency HNU
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U163
Item number .W49 2019
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355.4 W62 2019
Edition number 23
Placement Code GC
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Whyte, Christopher,
Dates associated with a name 1988-
Relator term author.
245 10 - TITLE STATEMENT
Title Understanding cyber warfare :
Remainder of title politics, policy and strategy /
Statement of responsibility, etc. Christopher Whyte and Brian Mazanec.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London ;
-- New York :
Name of producer, publisher, distributor, manufacturer Routledge Taylor & Francis Group
Date of production, publication, distribution, manufacture, or copyright notice ©2019.
300 ## - PHYSICAL DESCRIPTION
Extent x, 296 pages ;
Dimensions 25 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction 2. From Bytes to Fights: The Technological Foundations of Insecurity in the Digital Age 3. Cyberspace and International Relations 4. Exploitation: From Signals Intelligence to Cyber Warriors 5. Attack: From Exploitation to Offensive Cyber Operations 6. A Brief History of Major Cyber Conflict Episodes 7. States at Cyberwar: The Dynamics of Interstate Cyber Interactions 8. Cyber Conflict as 'Not War' 9. Non-State Actors: Terrorism, Subversion and Activism Online 10. National Experiences with Cyber-Security: Realization and Institutional Development 11. Norms, Ethics and International Law for Offensive Cyber Operations 12. The Future of Cyber Conflict
520 ## - SUMMARY, ETC.
Summary, etc. "This textbook offers an accessible introduction to the historical, technical, and strategic context of cyber conflict. The international relations, policy, doctrine, strategy, and operational issues associated with computer network attack, computer network exploitation, and computer network defense are collectively referred to as cyber warfare. This new textbook provides students with a comprehensive perspective on the technical, strategic, and policy issues associated with cyber conflict as well as an introduction to key state and non-state actors."--Publisher's description.
521 ## - TARGET AUDIENCE NOTE
Target audience note CAS
Source Bachelor of Science in Criminology
546 ## - LANGUAGE NOTE
Language note Text in English
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace operations (Military science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace -- Security measures -- Government policy.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mazanec, Brian M.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Online version:
Main entry heading Whyte, Christopher, 1988- author.
Title Understanding cyber warfare
Place, publisher, and date of publication London ; New York : Routledge, 2019
International Standard Book Number 9781317265238
Record control number (DLC) 2018036471
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Classification part 300-399
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type
    Dewey Decimal Classification     GC College Library College Library General Circulation Section 08/11/2020 Library Fund 1 GC 355.4 W62 2019 HNU002585 08/29/2024 12/06/2023 02/22/2022 Books