| 000 | 01033nam a2200349Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20220912144343.0 | ||
| 006 | a|||||r|||| 00| 0 | ||
| 007 | ta | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9780123918550 (hbk) | ||
| 020 | _aSL01559895 | ||
| 024 | _a188425 | ||
| 037 | _b469, 25/02/2013, Book Seller | ||
| 037 | _cTextual | ||
| 040 |
_aCSL _beng _cCSL |
||
| 041 | _aeng | ||
| 082 | _aD65,8(B):(894), Q3 | ||
| 100 | _aAmoroso Edward G | ||
| 245 | 0 | _aCyber Attacks: Protecting national infrastructure | |
| 260 |
_aAmsterdam _bButterworth- Heinemann _c2013 |
||
| 300 | _axvi,320p. | ||
| 500 | _aAppendix A-B 283-304p.; Index 305-319p. | ||
| 650 | _a Computer crime | ||
| 650 | _a Cyber terrorism | ||
| 650 | _a Cyberspace- security measures | ||
| 650 | _aComputer Science | ||
| 700 | _aAmoroso Edward G | ||
| 942 |
_hD65,8(B):(894), Q3 _cTEXL _2CC |
||
| 999 |
_c5861 _d5861 |
||