Cyberthreats and the decline of the nation-state /

Saved in:
Bibliographic Details
Author / Creator:Brenner, Susan W., 1947- author.
Imprint:Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2014.
©2014.
Description:175 pages ; 24 cm.
Language:English
Series:Routledge research in IT and E-commerce law
Routledge research in IT and E-commerce law.
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/9981994
Hidden Bibliographic Details
Varying Form of Title:Cyber threats and the decline of the nation-state
ISBN:9780415823760 (hbk.)
0415823765 (hbk.)
Notes:Includes bibliographical references and index.

MARC

LEADER 00000cam a2200000 i 4500
001 9981994
003 ICU
005 20140527152400.0
008 130918t20142014enk b 001 0 eng
010 |a  2013036774 
016 7 |a 016596387  |2 Uk 
020 |a 9780415823760 (hbk.) 
020 |a 0415823765 (hbk.) 
035 |a (OCoLC)858749612 
040 |a DLC  |b eng  |e rda  |c DLC  |d YDX  |d OCLCO  |d BTCTA  |d UKMGB  |d CDX  |d YDXCP  |d CHVBK  |d ZXQ 
042 |a pcc 
049 |a CGUA 
050 0 0 |a K5215  |b .B743 2014 
082 0 0 |a 363.325  |2 23 
100 1 |a Brenner, Susan W.,  |d 1947-  |e author.  |0 http://id.loc.gov/authorities/names/n91027279  |1 http://viaf.org/viaf/41014337 
245 1 0 |a Cyberthreats and the decline of the nation-state /  |c Susan W. Brenner. 
246 3 |a Cyber threats and the decline of the nation-state 
264 1 |a Milton Park, Abingdon, Oxon ;  |a New York, NY :  |b Routledge,  |c 2014. 
264 4 |c ©2014. 
300 |a 175 pages ;  |c 24 cm. 
336 |a text  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
490 1 |a Routledge research in IT and E-commerce law 
504 |a Includes bibliographical references and index. 
505 0 |a Cyberchaos : law and disorder in cyberspace -- Threat morphing in cyberspace -- Threats and the evolution of threat control strategies -- Cyberspace and eroding threat control -- Proposed-and possible-solutions -- Lessons from history -- Distributed security -- Medieval cyberspace? 
650 0 |a Cyberterrorism.  |0 http://id.loc.gov/authorities/subjects/sh00001974 
650 0 |a Computer networks  |x Law and legislation  |x Criminal provisions. 
650 0 |a Cyberterrorism  |x Prevention. 
650 0 |a Computer crimes  |x Investigation.  |0 http://id.loc.gov/authorities/subjects/sh85029493 
650 0 |a National security.  |0 http://id.loc.gov/authorities/subjects/sh85090122 
650 7 |a Bekämpfung.  |2 gnd 
650 7 |a Computerkriminalität.  |2 gnd 
650 7 |a Computersicherheit.  |2 gnd 
650 7 |a Information warfare.  |2 gnd 
650 7 |a Innere Sicherheit.  |2 gnd 
650 7 |a Recht.  |2 gnd 
650 7 |a Computer crimes  |x Investigation.  |2 fast  |0 http://id.worldcat.org/fast/fst00872065 
650 7 |a Cyberterrorism.  |2 fast  |0 http://id.worldcat.org/fast/fst00885802 
650 7 |a Cyberterrorism  |x Prevention.  |2 fast  |0 http://id.worldcat.org/fast/fst01905567 
650 7 |a National security.  |2 fast  |0 http://id.worldcat.org/fast/fst01033711 
830 0 |a Routledge research in IT and E-commerce law.  |0 http://id.loc.gov/authorities/names/no2010076158 
903 |a HeVa 
929 |a cat 
999 f f |i 12a2d13d-c2e0-5a26-a68c-9a746c7fcca7  |s 88378d2e-e529-54fa-bb2b-6b2e83f8fa2c 
928 |t Library of Congress classification  |a XXK5215.B743 2014  |l DLL  |c DLL-Law  |i 1219578 
927 |t Library of Congress classification  |a XXK5215.B743 2014  |l DLL  |c DLL-Law  |b 72559998  |i 9289402