Library Logo

The virtual battlefield : (Record no. 3695)

000 -LEADER
fixed length control field 04008cam a22004097a 4500
001 - CONTROL NUMBER
control field 15919907
003 - CONTROL NUMBER IDENTIFIER
control field BD-DhUL
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140817151457.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090924s2009 wau b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2009937744
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781607500605 (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1607500604 (hbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn489010240
040 ## - CATALOGING SOURCE
Original cataloging agency BTCTA
Language of cataloging eng
Transcribing agency BTCTA
Modifying agency YDXCP
-- BWX
-- ILU
-- UPM
-- GEBAY
-- DLC
-- BD-DhUL
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U163
Item number .V557 2009
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355.02
Item number VIR
245 04 - TITLE STATEMENT
Title The virtual battlefield :
Remainder of title perspectives on cyber warfare /
Statement of responsibility, etc. edited by Christian Czosseck and Kenneth Geers.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Amsterdam ;
-- Washington, DC :
Name of publisher, distributor, etc. IOS Press,
Date of publication, distribution, etc. c2009.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 305 p. :
Other physical details ill. ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price type code US$
Price amount 138.92
490 0# - SERIES STATEMENT
Series statement Cryptology and information security series,
International Standard Serial Number 1871-6431 ;
Volume/sequential designation v. 3
500 ## - GENERAL NOTE
General note Includes indexes.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and indexes.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note pt. 1. Strategic viewpoints. Cyber wars : a paradigm shift from means to ends / Amit Sharma -- Towards an evolving theory of cyberpower / Stuart H. Starr -- Sub rosa cyber war / Martin C. Libicki -- Warfare and the continuum of cyber risks : a policy perspective / Andrew Cutts -- Cyber terrorism : a new dimension in battlespace / J.P.I.A.G Charvat -- Borders in cyberspace : can sovereignty adapt to the challenges of cyber security? / Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. Rios -- Belarus in the context of European cyber security / Fyodor Pavlyuchenko -- Politically motivated denial of service attacks / Jose Nazario -- A brief examination of media coverage of cyberattacks (2007-present) / Cyrus Farivar --
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note pt. 2. Technical challenges and solutions. Behavioral analysis of zombie armies / Olivier Thonnard, Wim Mees, Marc Dacier -- Proactive botnet countermeasures-an offensive approach / Felix Leder, Tillmann Werner, Peter Martini -- When not to pull the plug-the need for network counter-surveillance operations / Scott Knight, Sylvain Leblanc -- Autonomic computer network defence using risk state and reinforcement learning / Luc Beaudoin, Nathalie Japkowicz, Stan Matwin -- Enhancing graph-based automated DoS attack response / Gabriel Klein ... [et al.] -- On nth order attacks / Daniel Bilar -- Business and social evaluation of denial of service attacks in view of scaling economic counter-measures / Louis-Francois Pau -- Virtual plots, real revolution / Roelof Temmingh, Kenneth Geers.
520 1# - SUMMARY, ETC.
Summary, etc. "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections--Strategic viewpoints and Technical challenges & solutions--and highlights the growing connection between computer security and national security"--P. 4 of cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Czosseck, Christian.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Geers, Kenneth.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Price effective from Date last seen Permanent Location Not for loan Date acquired Source of classification or shelving scheme Koha item type Lost status Withdrawn status Source of acquisition Collection code Damaged status Shelving location Barcode Current Location Full call number
2014-08-172014-08-17Dhaka University Science Library 2012-12-24 Books  PurchasedNon Fiction General Stacks477614Dhaka University Science Library355.02 VIR
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login