A cyberworm that knows no boundaries (Record no. 679083)

MARC details
000 -LEADER
fixed length control field 04061cam a2200649Ma 4500
001 - CONTROL NUMBER
control field ocn779827926
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240829143536.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120312s2011 caua ob 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EBLCP
Language of cataloging eng
Transcribing agency EBLCP
Modifying agency OCLCQ
-- YDXCP
-- N$T
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780833059802 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0833059807 (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)779827926
035 ## - SYSTEM CONTROL NUMBER
System control number 452103
-- (N$T)
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.C68
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library N$TA
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Porche, Isaac,
Dates associated with a name 1968-
9 (RLIN) 624598
245 12 - TITLE STATEMENT
Title A cyberworm that knows no boundaries
Medium [electronic resource] /
Statement of responsibility, etc. Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Santa Monica :
Name of publisher, distributor, etc. RAND Corp.,
Date of publication, distribution, etc. 2011.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (54 p.) :
Other physical details ill.
490 1# - SERIES STATEMENT
Series statement Occasional paper ;
Volume/sequential designation OP-342-OSD
500 ## - GENERAL NOTE
General note "Prepared for the Office of the Secretary of Defense."
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography.
520 ## - SUMMARY, ETC.
Summary, etc. Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer viruses.
9 (RLIN) 96410
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberinfrastructure
General subdivision Security measures.
9 (RLIN) 624599
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberspace
General subdivision Security measures.
9 (RLIN) 177124
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
9 (RLIN) 941
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Internet / Security
Source of heading or term bisacsh
9 (RLIN) 5483
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Networking / Security
Source of heading or term bisacsh
9 (RLIN) 5489
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General
Source of heading or term bisacsh
9 (RLIN) 5487
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer viruses.
9 (RLIN) 96410
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberspace
General subdivision Security measures.
9 (RLIN) 177124
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberinfrastructure
General subdivision Security measures.
9 (RLIN) 624599
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
9 (RLIN) 396
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sollinger, Jerry M.
9 (RLIN) 317963
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name McKay, Shawn.
9 (RLIN) 624604
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Porche, Isaac R.
Title A Cyberworm that Knows No Boundaries
Place, publisher, and date of publication Santa Monica : RAND Corporation, c2011
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Occasional paper (Rand Corporation) ;
Volume number/sequential designation OP-342-OSD.
9 (RLIN) 382083
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified EBSCOhost
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452103">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=452103</a>
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL846009
938 ## -
-- YBP Library Services
-- YANK
-- 7405939
910 ## - USER-OPTION DATA (OCLC)
User-option data cpp1723AUTO
994 ## -
-- 02
-- N$T
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     EBSCO Computers e-Library   29/08/2024   29/08/2024 29/08/2024 eBook

Powered by Koha