MARC details
000 -LEADER |
fixed length control field |
02511nam a2200265Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
RRU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230416233141.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210901b ||||||||| ||||||| 0|eng|d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
ISBN |
9780806524146 |
Printed Price |
Rs. 608.93 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
RRU |
Language of cataloging |
English |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
Eng. |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Class No. |
303.625 |
Item number |
DUN |
100 ## - FIRST AUTHOR (IF A PERSON) |
9 (RLIN) |
3620 |
Name of author |
Dunnigan, James F |
245 #4 - TITLE STATEMENT |
Title |
The Next War Zone : Confronting the Global Threat of Cyberterrorism |
Statement of responsibility |
by James F. Dunnigan |
250 ## - EDITION STATEMENT |
Edition statement |
1st Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Name of publisher, distributor, etc. |
Citadel Press |
Place of publication, distribution, etc. |
New York |
Date of publication, distribution, etc. |
2002 |
300 ## - PHYSICAL DESCRIPTION |
No. of pages |
303p. |
Other physical details |
; 24 cm |
520 ## - SUMMARY, ETC. |
Summary, etc. |
The next war is going to take place on a new battlefield: your own computer. You can't see it, but it's there, hidden in your home PC. A threat so potent, it could destroy massive amounts of data, and shut down power plants, fuel supplies, space satellites, the armed forces, millions of computers, and even parts of the Internet. A virtually undetectable but devastating new weapon is cyberwarfare, the next wave of terrorism, and it could be launched from your very own computer. Thousands of computer super viruses, monster worms, and zombies created by terrorists and rogue governments are the new tools of war with the potential for catastrophic results. The author sounds the alarm on what could be the nation's next surprise attack -- a cyber Pearl Harbor just waiting to happen. Every day, there are warnings of computer viruses and Internet weaknesses with the potential to disrupt society. Most are the work of amateur hackers. But consider also the super zombies, military-grade computer weapons being created by government cyberwar units. Virtually undetectable, they have the power to destroy everything, lethally spread via the Internet, and hide on home computers, waiting to be unleashed. Despite constant warnings about our cyber vulnerability, and billions of dollars spent defending our networks, the risk of catastrophic cyber attacks continues to grow. The author explains the rules of cyberwar -- what it is, what could happen, and how to protect yourself from becoming a pawn. From real-life attack scenarios to explanations of monster viruses; from cyberwarriors to what forces pose the most dangerous threats, he offers clear, concise information for fighting back against a phantom enemy that may be the deadliest we've ever known |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Subject heading |
Terrorism |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Subject heading |
Cyberterrorism |
9 (RLIN) |
3537 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Subject heading |
Cyberterrorism--Prevention |
9 (RLIN) |
2454 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Subject heading |
Computer crimes |
9 (RLIN) |
935 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Subject heading |
Cyberterrorism--Prevention |
9 (RLIN) |
2454 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |