Brandishing cyberattack capabilities / / Martin C. Libicki.

Saved in:
Bibliographic Details
:
Place / Publishing House:Santa Monica, CA : : Rand National Defense Research Institute,, 2013.
Year of Publication:2013
Language:English
Physical Description:1 online resource (46 pages)
Notes:Prepared for the Office of the Secretary of Defense.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993628447104498
ctrlnum (CKB)3710000000086256
(SSID)ssj0001153781
(PQKBManifestationID)11615611
(PQKBTitleCode)TC0001153781
(PQKBWorkID)11153905
(PQKB)11565545
(MiAaPQ)EBC1663939
(EXLCZ)993710000000086256
collection bib_alma
record_format marc
spelling Libicki, Martin C.
Brandishing cyberattack capabilities / Martin C. Libicki.
Santa Monica, CA : Rand National Defense Research Institute, 2013.
1 online resource (46 pages)
text txt
computer c
online resource cr
English
Prepared for the Office of the Secretary of Defense.
Includes bibliographical references.
Description based on online resource; title from PDF title page (ebrary, viewed February 11, 2014).
Information warfare United States.
Cyberterrorism United States Prevention.
Computer networks Security measures United States.
Cyberspace Security measures United States.
Computer networks Security measures Government policy United States.
language English
format eBook
author Libicki, Martin C.
spellingShingle Libicki, Martin C.
Brandishing cyberattack capabilities /
author_facet Libicki, Martin C.
author_variant m c l mc mcl
author_sort Libicki, Martin C.
title Brandishing cyberattack capabilities /
title_full Brandishing cyberattack capabilities / Martin C. Libicki.
title_fullStr Brandishing cyberattack capabilities / Martin C. Libicki.
title_full_unstemmed Brandishing cyberattack capabilities / Martin C. Libicki.
title_auth Brandishing cyberattack capabilities /
title_new Brandishing cyberattack capabilities /
title_sort brandishing cyberattack capabilities /
publisher Rand National Defense Research Institute,
publishDate 2013
physical 1 online resource (46 pages)
isbn 0-8330-8004-0
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6773
callnumber-sort HV 46773.2 L53 42013
geographic_facet United States.
United States
illustrated Not Illustrated
work_keys_str_mv AT libickimartinc brandishingcyberattackcapabilities
status_str n
ids_txt_mv (CKB)3710000000086256
(SSID)ssj0001153781
(PQKBManifestationID)11615611
(PQKBTitleCode)TC0001153781
(PQKBWorkID)11153905
(PQKB)11565545
(MiAaPQ)EBC1663939
(EXLCZ)993710000000086256
carrierType_str_mv cr
is_hierarchy_title Brandishing cyberattack capabilities /
_version_ 1796653678645477377
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01570nam a2200433 i 4500</leader><controlfield tag="001">993628447104498</controlfield><controlfield tag="005">20230803034418.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">140211s2013 cau ob 000 0 eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8004-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000000086256</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001153781</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11615611</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001153781</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)11153905</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11565545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC1663939</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000000086256</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773.2</subfield><subfield code="b">.L53 2013</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Brandishing cyberattack capabilities /</subfield><subfield code="c">Martin C. Libicki.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand National Defense Research Institute,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (46 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Prepared for the Office of the Secretary of Defense.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (ebrary, viewed February 11, 2014).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:41:23 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-02-09 11:10:58 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350453840004498&amp;Force_direct=true</subfield><subfield code="Z">5350453840004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350453840004498</subfield></datafield></record></collection>