Cyberterrorism (Record no. 57265)

000 -LEADER
fixed length control field 03729nam a22005535i 4500
001 - CONTROL NUMBER
control field 978-1-4939-0962-9
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112052.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140624s2014 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781493909629
-- 978-1-4939-0962-9
082 04 - CLASSIFICATION NUMBER
Call Number 005.7
245 10 - TITLE STATEMENT
Title Cyberterrorism
Sub Title Understanding, Assessment, and Response /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XXIII, 215 p. 5 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 What is 'Cyberterrorism'? Computer and Internet Technology in Legal Definitions of Terrorism -- Understanding, Locating and Constructing 'Cyberterrorism' -- Rethinking the Threat of Cyberterrorism -- Putting the 'Cyber' into Cyberterrorism: Re-reading Technological Risk in a Hyperconnected World -- Dr. Strangeweb: Or How they Stopped Worrying and Learned to Love Cyber War -- Reality Check: Assessing the (Un)Likelihood of Cyberterrorism -- Cyber Threats to Critical Information Infrastructure -- The Citadel and its Sentinels: State Strategies for Contesting Cyberterrorism in the UK -- The Criminalisation of Terrorists' Online Preparatory Acts -- Adaptive Responses to Cyberterrorism.
520 ## - SUMMARY, ETC.
Summary, etc This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
700 1# - AUTHOR 2
Author 2 Chen, Thomas M.
700 1# - AUTHOR 2
Author 2 Jarvis, Lee.
700 1# - AUTHOR 2
Author 2 Macdonald, Stuart.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4939-0962-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- New York, NY :
-- Springer New York :
-- Imprint: Springer,
-- 2014.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Application software.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Criminal law.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems and Communication Service.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Criminal Law.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Appl. in Social and Behavioral Sciences.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
912 ## -
-- ZDB-2-SCS

No items available.