Cyber-security and information warfare/ (Record no. 41289)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01725nam a22001937a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | PILC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20201006110824.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 201006b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781536143867 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | Elb 005.8 |
Item number | D21c 2019 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Daras, Nicholas J. |
245 ## - TITLE STATEMENT | |
Title | Cyber-security and information warfare/ |
Statement of responsibility, etc. | Nicholas J. Daras |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc. | Nova Science Publishers |
Date of publication, distribution, etc. | 2019 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 399p. |
Other physical details | https://b-ok.asia/book/5286233/aa3163 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | A variety of modern research methods in a number of innovating cyber-security techniques and information management technologies are provided in this book along with new related mathematical developments and support applications from engineering. This allows for the exploration of new approaches, useful practices and related problems for further investigation. Distinguished researchers and scientists coming from different scientific origins present their research and views concerning cyber-security, information warfare and communications systems. Graduate students, scientists and engineers interested in a broad spectrum of current theories, methods, and applications in interdisciplinary fields will find this book invaluable. Topics covered include: Electronic crime and ethics in cyberspace, new technologies in security systems/systems interfaces, economic information warfare, digital security in the economy, human factor evaluation of military security systems, cyber warfare, military communications, operational analysis and information warfare, and engineering applications to security systems/detection theory. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | 1. Computer security 2. Information warfare |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://b-ok.asia/book/5286233/aa3163">https://b-ok.asia/book/5286233/aa3163</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | E-Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Non-fiction | Higher Education Department Library | Higher Education Department Library | Digital Collection | 10/06/2020 | Free Access (https://b-ok.asia/book/5286233/aa3163) | Elb 005.8 D21c 2019 | Elb 234 | 10/06/2020 | 1 | 10/06/2020 | E-Books |