Cyber warfare : (Record no. 22249)

MARC details
000 -LEADER
fixed length control field 01869cam a2200325 i 4500
001 - CONTROL NUMBER
control field 17866626
003 - CONTROL NUMBER IDENTIFIER
control field AUA.1
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190517105454.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130827s2014 ne a bf 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013034031
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124166721 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U163
Item number .A64 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355.3/43
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Andress, Jason.
245 10 - TITLE STATEMENT
Title Cyber warfare :
Remainder of title techniques, tactics and tools for security practitioners /
Statement of responsibility, etc Jason Andress, Steve Winterfeld, Lillian Ablon, Technical Editor.
246 3# - VARYING FORM OF TITLE
Title proper/short title Cyberwarfare, techniques, tactics and tools for security practitioners
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Waltham, Massachusetts :
Name of publisher, distributor, etc Syngress, an imprint of Elsevier,
Date of publication, distribution, etc c2014
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 306 pages :
Other physical details illustration ;
Dimensions 24 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Form subdivision Handbooks, manuals, etc.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Winterfeld, Steve.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Classification part U 163
Item part .A64 2014
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
    Library of Congress Classification     Books Judith Thomas Library Judith Thomas Library General Stacks 17/05/2019 Bought by JTL 33.05 AUA24998 U 163 .A64 2014 AUA24998 17/05/2019 33.05 17/05/2019 Books