<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01127    a2200169   4500</leader>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0201433036 (acid-free paper)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="a">DLC</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Denning, Dorothy Elizabeth Robling,</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Information warfare and security </subfield>
    <subfield code="c">Dorothy E. Denning.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">India :</subfield>
    <subfield code="b">ACM Press ;</subfield>
    <subfield code="a">Reading, Ma. :</subfield>
    <subfield code="b">Addison-Wesley,</subfield>
    <subfield code="c">c1999.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xvii, 522 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="520" ind1="1" ind2=" ">
    <subfield code="a">"In Information Warfare and Security, Dorothy E. Denning, a pioneer in computer security, provides a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary."--BK JACKET.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Information warfare.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Information warfare</subfield>
    <subfield code="z">United States.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">National security</subfield>
    <subfield code="z">United States.</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">BK</subfield>
    <subfield code="k">005.8 DEN</subfield>
    <subfield code="2">ddc</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">6671</subfield>
    <subfield code="d">6671</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">CL</subfield>
    <subfield code="b">CL</subfield>
    <subfield code="c">AI</subfield>
    <subfield code="d">2002-01-23</subfield>
    <subfield code="e">Academic Book Company</subfield>
    <subfield code="g">492.98</subfield>
    <subfield code="l">1</subfield>
    <subfield code="m">1</subfield>
    <subfield code="o">005.8 DEN</subfield>
    <subfield code="p">SEECS001726</subfield>
    <subfield code="r">2019-01-29</subfield>
    <subfield code="s">2018-11-14</subfield>
    <subfield code="w">2017-01-05</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
