Pesquisa de referências

War of the cyberworld

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20120015739</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20120522173232.0</controlfield>
    <controlfield tag="008">120420e20120401esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">War of the cyberworld</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Cyberspace has become the fifth domain of warfare, after land, sea, air and space, according to a recent article in "the Economist". According to a high-ranking intelligence source, an estimated 20 countries are sophisticated enough to launch a serious cyber attack, including the USA, UK, China, France, Israel, and Iran, which boasts the second-largest cyber army. But while nation states around the world are busy building cyber warfare arsenals, there is another front opening up and the foes aren't all that evenly matched.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080550721</subfield>
      <subfield code="a">Espionaje</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080587581</subfield>
      <subfield code="a">Riesgo informático</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080586546</subfield>
      <subfield code="a">Nuevas tecnologías</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080595838</subfield>
      <subfield code="a">Delitos informáticos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080544119</subfield>
      <subfield code="a">Hackers</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077002059</subfield>
      <subfield code="t">Strategic risk</subfield>
      <subfield code="d">Southhall : NewsQuest, 2005-2012</subfield>
      <subfield code="g">02/04/2012 Número April  - abril 2012 , p. 12-14</subfield>
    </datafield>
  </record>
</collection>