Brandishing cyberattack capabilities / / Martin C. Libicki.
Saved in:
: | |
---|---|
Place / Publishing House: | Santa Monica, CA : : Rand National Defense Research Institute,, 2013. |
Year of Publication: | 2013 |
Language: | English |
Physical Description: | 1 online resource (46 pages) |
Notes: | Prepared for the Office of the Secretary of Defense. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628447104498 |
---|---|
ctrlnum |
(CKB)3710000000086256 (SSID)ssj0001153781 (PQKBManifestationID)11615611 (PQKBTitleCode)TC0001153781 (PQKBWorkID)11153905 (PQKB)11565545 (MiAaPQ)EBC1663939 (EXLCZ)993710000000086256 |
collection |
bib_alma |
record_format |
marc |
spelling |
Libicki, Martin C. Brandishing cyberattack capabilities / Martin C. Libicki. Santa Monica, CA : Rand National Defense Research Institute, 2013. 1 online resource (46 pages) text txt computer c online resource cr English Prepared for the Office of the Secretary of Defense. Includes bibliographical references. Description based on online resource; title from PDF title page (ebrary, viewed February 11, 2014). Information warfare United States. Cyberterrorism United States Prevention. Computer networks Security measures United States. Cyberspace Security measures United States. Computer networks Security measures Government policy United States. |
language |
English |
format |
eBook |
author |
Libicki, Martin C. |
spellingShingle |
Libicki, Martin C. Brandishing cyberattack capabilities / |
author_facet |
Libicki, Martin C. |
author_variant |
m c l mc mcl |
author_sort |
Libicki, Martin C. |
title |
Brandishing cyberattack capabilities / |
title_full |
Brandishing cyberattack capabilities / Martin C. Libicki. |
title_fullStr |
Brandishing cyberattack capabilities / Martin C. Libicki. |
title_full_unstemmed |
Brandishing cyberattack capabilities / Martin C. Libicki. |
title_auth |
Brandishing cyberattack capabilities / |
title_new |
Brandishing cyberattack capabilities / |
title_sort |
brandishing cyberattack capabilities / |
publisher |
Rand National Defense Research Institute, |
publishDate |
2013 |
physical |
1 online resource (46 pages) |
isbn |
0-8330-8004-0 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6773 |
callnumber-sort |
HV 46773.2 L53 42013 |
geographic_facet |
United States. United States |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT libickimartinc brandishingcyberattackcapabilities |
status_str |
n |
ids_txt_mv |
(CKB)3710000000086256 (SSID)ssj0001153781 (PQKBManifestationID)11615611 (PQKBTitleCode)TC0001153781 (PQKBWorkID)11153905 (PQKB)11565545 (MiAaPQ)EBC1663939 (EXLCZ)993710000000086256 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Brandishing cyberattack capabilities / |
_version_ |
1796653678645477377 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01570nam a2200433 i 4500</leader><controlfield tag="001">993628447104498</controlfield><controlfield tag="005">20230803034418.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">140211s2013 cau ob 000 0 eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8004-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000000086256</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001153781</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11615611</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001153781</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)11153905</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11565545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC1663939</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000000086256</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773.2</subfield><subfield code="b">.L53 2013</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Brandishing cyberattack capabilities /</subfield><subfield code="c">Martin C. Libicki.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand National Defense Research Institute,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (46 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Prepared for the Office of the Secretary of Defense.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (ebrary, viewed February 11, 2014).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:41:23 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-02-09 11:10:58 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350453840004498&Force_direct=true</subfield><subfield code="Z">5350453840004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350453840004498</subfield></datafield></record></collection> |