MARC details
| 000 -LEADER |
| fixed length control field |
04568nam a2200433 i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250919010719.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
160204t2015 enk bi 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780190204792 |
| Qualifying information |
hardback |
| Terms of availability |
RM128.86 |
| 039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
| Level of rules in bibliographic description |
201605171456 |
| Level of effort used to assign nonsubject heading access points |
haiyati |
| Level of effort used to assign subject headings |
201605120838 |
| Level of effort used to assign classification |
lan |
| Level of effort used to assign subject headings |
201605040931 |
| Level of effort used to assign classification |
rahah |
| y |
02-04-2016 |
| z |
rahah |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
DLC |
| Modifying agency |
BTCTA |
| -- |
YDXCP |
| -- |
BDX |
| -- |
OLP |
| -- |
IJ5 |
| -- |
CDX |
| -- |
OCLCF |
| -- |
NLE |
| -- |
OVY |
| -- |
OCLCQ |
| -- |
UKM |
| Description conventions |
rda |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
U163.V338 |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
U163 |
| Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
.V338 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Valeriano, Brandon |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Cyber war versus cyber realities : |
| Remainder of title |
cyber conflict in the international system / |
| Statement of responsibility, etc. |
Brandon Valeriano and Ryan C. Maness. |
| 246 18 - VARYING FORM OF TITLE |
| Display text |
spine title : |
| Title proper/short title |
Cyber war versus cyber realities. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Oxford : |
| Name of producer, publisher, distributor, manufacturer |
Oxford University Press, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
| 264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Date of production, publication, distribution, manufacture, or copyright notice |
©2015. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xiv, 266 pages ; |
| Dimensions |
25 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes index and references : pages 248-257. |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
The contours of the cyber conflict world -- Cyberpower, cyber weapons, and cyber operations -- Theories of cyber conflict : restraint, regionalism, espionage, and cyber terrorism in the digital era -- The dynamics of cyber conflict between rival antagonists -- The impact of cyber actions : cyber events and the conflict-cooperation nexus -- Stuxnet, Shamoon, and Bronze Soldier : the impact and responses to cyber operations -- Cyber conflict and non-state actors : weapons of fear -- Cyber rules : encouraging a system of justice and proportionality in cyber operations -- Conclusion -- Appendix: Research methods. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
'In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism'-- |
| Assigning source |
Provided by publisher. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
'What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism'-- |
| Assigning source |
Provided by publisher. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cyberspace operations (Military science). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cyberterrorism. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Technology and international relations. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Internet and international relatins. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Maness, Ryan C. |
| Relator term |
author. |
| 907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) |
| a |
.b16270101 |
| b |
2019-11-12 |
| c |
2019-11-12 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
AM |
| Suppress in OPAC |
No |
| Call number prefix |
U163.V338 |
| 914 ## - VTLS Number |
| VTLS Number |
vtls003600066 |
| 990 ## - EQUIVALENCES OR CROSS-REFERENCES [LOCAL, CANADA] |
| Link information for 9XX fields |
rab |
| 991 ## - LOCAL NOTE (NAMA FAKULTI/INSTITUT/PUSAT) |
| a |
Fakulti Sains Sosial dan Kemanusiaan |
| 998 ## - LOCAL CONTROL INFORMATION (RLIN) |
| Library |
PERPUSTAKAAN TUN SERI LANANG |
| Operator's initials, OID (RLIN) |
2016-04-02 |
| Cataloger's initials, CIN (RLIN) |
m |
| Material Type (Sierra) |
Printed Books |
| Language |
English |
| Country |
|
| -- |
0 |
| -- |
.b16270101 |