<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01484    a2200217   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20220728094837.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">   94002412</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">1560250801 :</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">302.2,SCH</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Schwartau, Winn.</subfield>
    <subfield code="9">95566</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Information warfare :</subfield>
    <subfield code="b">chaos on the electronic superhighway /</subfield>
    <subfield code="c">Winn Schwartau.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
    <subfield code="a">1st ed.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">New York :</subfield>
    <subfield code="b">Thunder's Mouth Press ;</subfield>
    <subfield code="a">Emeryville, CA :</subfield>
    <subfield code="b">Distributed by Publishers Group West,</subfield>
    <subfield code="c">c1994.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">432 p. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">The Econo-Politics of  Information Warfare (Page-27), Computers Everywhere and the Global Network (Page-49), Binary Schizophrenia (Page-65), On the Nature of insidious (Page-82) Influenza, Malicious Software, and OOPS! (Page-95), Sniffers and the Switch (Page-114), World of Mr. Van Eck, (Page-13, Cryptography (Page-148), Chipping: Silicon-Based Malicious Software (Page-160), HERF Guns and EMP/T Bombs (Page-172), Hackers: The First Information warriors in Cyberspace (Page-190), Who are the Information warriors? (Page-215), The Military Perspective (Page-249), Class 1: Personal Information Warfare (Page-258), Class 2: Corporate Information Warfare (Page-271), Class 3: Global Information Warfare (Page-291), Defence before Defeat (Page-312), Outline of a national information Policy (Page-316), The Future Of Information warfare (Page-354).</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes.</subfield>
    <subfield code="9">18532</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security.</subfield>
    <subfield code="9">570</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">REF</subfield>
    <subfield code="2">ddc</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">175342</subfield>
    <subfield code="d">175342</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">REF</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="o">302.2,SCH</subfield>
    <subfield code="p">MCS22713</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
    <subfield code="z">Almirah No.19, Shelf No.1</subfield>
  </datafield>
</record>
