MARC details
| 000 -LEADER |
| fixed length control field |
01554cam a2200325 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
19404314 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210418122213.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
161212s2017 enk b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781138033290 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-NcFUE |
| Language of cataloging |
eng |
| Transcribing agency |
EG-NcFUE |
| Description conventions |
rda |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
G.A.C |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Guiora, Amos N., |
| Dates associated with a name |
1957- |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Cybersecurity : |
| Remainder of title |
geopolitics, law and policy / |
| Statement of responsibility, etc |
Amos N. Guiora. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
London ; |
| -- |
New York : |
| Name of publisher, distributor, etc |
Routledge, Taylor & Francis Group, |
| Date of publication, distribution, etc |
2017 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
170 pages ; |
| Dimensions |
23 cm |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| Content type code |
txt |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| Media type code |
n |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| Carrier type code |
nc |
| 500 #0 - GENERAL NOTE |
| General note |
Includes appendix |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references (pages 164-165) and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
1. An Introduction to Cyber-Security<br/><br/>2. What is Cyber-Security?<br/><br/>3. Geo-Politics & Cyber-Security<br/><br/>4. International Law & Cyber-Security<br/><br/>5. Development & Implementation of Cyber-Security Policy<br/><br/>6. How Do Corporations Respond to Cyber-Crime?<br/><br/>7. How Can Individuals Mitigate Cyber-Security?<br/><br/>8. How Does Law Enforcement Mitigate Cyber-Security?<br/><br/>9. Cyber-Security in the Future<br/><br/>10. Final Word |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures |
| -- |
Government policy. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| General subdivision |
Government policy. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer crimes |
| General subdivision |
Prevention. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Technology and international relations. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Cyber intelligence (Computer security) |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| General subdivision |
Law and legislation |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |