Welcome to Central Library, SUST

Cyber challenges and national security (Record no. 35344)

MARC details
000 -LEADER
fixed length control field 02508nam a22003497a 4500
001 - CONTROL NUMBER
control field sulb-eb0014036
003 - CONTROL NUMBER IDENTIFIER
control field BD-SySUS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160404161634.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111229s2012 dcu o 00 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781589019195
International Standard Book Number 1589019199
Canceled/invalid ISBN 9781589019188 (pbk. : alk. paper)
Canceled/invalid ISBN 1589019180
040 ## - CATALOGING SOURCE
Original cataloging agency MdBmJHUP
Transcribing agency MdBmJHUP
Modifying agency BD-SySUS.
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15.C97
Item number C93 2012
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355/.033002854678
Edition number 23
245 00 - TITLE STATEMENT
Title Cyber challenges and national security
Medium [electronic resource] :
Remainder of title threats, opportunities, and power in a virtual world /
Statement of responsibility, etc. Derek S. Reveron, editor.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Washington, D.C. :
Name of publisher, distributor, etc. Georgetown University Press,
Date of publication, distribution, etc. c2012.
Place of manufacture (Baltimore, Md. :
Manufacturer Project MUSE,
Date of manufacture 2015)
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (256 p.)
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note List of illustrations -- Acknowledgments -- Thinking about cyber -- Introduction : national security and cyberspace / Derek S. Reveron -- Speculative security / Patrick Jagoda -- Operational considerations in cyberattack and cyberexploitation / Herbert Lin -- Joining cyber crime and cyber terrorism : a likely scenario / Steven Bucci -- Armed conflict and cyber defense -- Inter arma silent leges redux? : the law of armed conflict and cyber-conflict / David P. Fidler -- The emerging structure of strategic cyber offense, defense, and deterrence / Richard B. Andres -- A new framework for cyber-deterrence / Jeffrey R. Cooper -- Cybered conflict, cyber power, and security resilience as strategy / Chris Demchak -- National approaches to cybersecurity and cyberwar -- Persistent enemies and cyberwar : rivalry relations in an age of information warfare / Brandon Valeriano and Ryan Maness -- Transatlantic cyber / James Joyner -- The bear goes digital : Russia and its cyber capabilities / Nikolas K. Gvosdev -- China in cyberspace / Nigel Inkster -- Toward a theory of cyberpower : strategic purpose in peace and war / John B. Sheldon -- Conclusion / Derek S. Reveron -- About the contributors -- Index.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Conflict management.
Topical term or geographic name as entry element National security.
Topical term or geographic name as entry element Cyberterrorism.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Reveron, Derek S.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Project Muse.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title UPCC book collections on Project MUSE.
856 40 - ELECTRONIC LOCATION AND ACCESS
Public note Full text available:
Uniform Resource Identifier <a href="https://muse.jhu.edu/books/9781589019195/">https://muse.jhu.edu/books/9781589019195/</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type

No items available.