Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Cybersecurity : (Record no. 12053)

MARC details
000 -LEADER
fixed length control field 01554cam a2200325 i 4500
001 - CONTROL NUMBER
control field 19404314
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210418122213.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161212s2017 enk b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138033290
040 ## - CATALOGING SOURCE
Original cataloging agency EG-NcFUE
Language of cataloging eng
Transcribing agency EG-NcFUE
Description conventions rda
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number G.A.C
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Guiora, Amos N.,
Dates associated with a name 1957-
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity :
Remainder of title geopolitics, law and policy /
Statement of responsibility, etc Amos N. Guiora.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc London ;
-- New York :
Name of publisher, distributor, etc Routledge, Taylor & Francis Group,
Date of publication, distribution, etc 2017
300 ## - PHYSICAL DESCRIPTION
Extent 170 pages ;
Dimensions 23 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
500 #0 - GENERAL NOTE
General note Includes appendix
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 164-165) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. An Introduction to Cyber-Security<br/><br/>2. What is Cyber-Security?<br/><br/>3. Geo-Politics & Cyber-Security<br/><br/>4. International Law & Cyber-Security<br/><br/>5. Development & Implementation of Cyber-Security Policy<br/><br/>6. How Do Corporations Respond to Cyber-Crime?<br/><br/>7. How Can Individuals Mitigate Cyber-Security?<br/><br/>8. How Does Law Enforcement Mitigate Cyber-Security?<br/><br/>9. Cyber-Security in the Future<br/><br/>10. Final Word
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Government policy.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Government policy.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Technology and international relations.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Law and legislation
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
  Dewey Decimal Classification       Main library Main library A2 17/02/2020 Anglo Egyptian bookshop 900.00 Purchase 2020   005.8 G.A.C 00015437 19/02/2025 1 17/02/2020 Books