Pesquisa de referências

ISTR : Internet Security Threat Report

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20180012044</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20220901134625.0</controlfield>
    <controlfield tag="008">180418s2018    usa||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">ISTR</subfield>
      <subfield code="b">: Internet Security Threat Report</subfield>
      <subfield code="c">Gillian Cleary...[et al.]</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">Mountain View, CA</subfield>
      <subfield code="b">Symantec</subfield>
      <subfield code="c">2018</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coinminers, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. With each passing year, not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so. </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603731</subfield>
      <subfield code="a">Seguridad informática</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080547738</subfield>
      <subfield code="a">Internet</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20150010735</subfield>
      <subfield code="a">Internet de las cosas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20120007895</subfield>
      <subfield code="a">Dispositivos móviles</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080570286</subfield>
      <subfield code="a">Redes sociales</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080616007</subfield>
      <subfield code="a">Aplicaciones informáticas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2=" ">
      <subfield code="0">MAPA20080595296</subfield>
      <subfield code="a">Comercio electrónico</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20180005640</subfield>
      <subfield code="a">Cleary, Gillian</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20170004011</subfield>
      <subfield code="a">Symantec</subfield>
    </datafield>
  </record>
</collection>