MARC details
000 -LIDER |
fixed length control field |
03364nam a22005415i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-658-43879-1 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250516160031.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240502s2024 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783658438791 |
-- |
978-3-658-43879-1 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UTN |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM053000 |
Source |
bisacsh |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UTN |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kestner, Peter. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
245 14 - TITLE STATEMENT |
Title |
The Art of Cyber Warfare |
Medium |
[electronic resource] : |
Remainder of title |
Strategic and Tactical Approaches for Attack and Defense in the Digital Age / |
Statement of responsibility, etc. |
by Peter Kestner. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2024. |
264 #1 - |
-- |
Wiesbaden : |
-- |
Springer Fachmedien Wiesbaden : |
-- |
Imprint: Springer, |
-- |
2024. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XX, 292 p. 1 illus. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction: 1984 and the lessons of the past -- Lessons from the past -- Modern and hybrid warfare -- The art of cyber warfare -- Outlook: The future of cyber warfare. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources - but not the laws of physics - it is possible to learn from past actions and reactions. The author aims to demonstrate in this book that, in reality, we have only transferred old methods into our current era but have forgotten to translate their reasons, effects, and the resulting lessons. For, as it has been for thousands of years, the reasons for human-created conflicts remain the same: wealth, fame, power, honor, or desire. Can we learn something from history for present and future (cyber) wars? The author Peter Kestner is a security consultant with over 25 years of experience in the field of cybersecurity. He advises SMEs and DAX30 companies, as well as government and defense entities, on cybersecurity, cybercrime, and cyberterrorism. His focus has been on the security of databases, operating systems, hardware, networks, as well as cryptography and steganography. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content. |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Owner |
UABC ; |
Method of acquisition |
Perpetuidad |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computer security. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computer Crime. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Principles and Models of Security. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783658438784 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783658438807 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Public note |
Libro electrónico |
Uniform Resource Identifier |
http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-658-43879-1 |
912 ## - |
-- |
ZDB-2-SCS |
912 ## - |
-- |
ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Libro Electrónico |