Pesquisa de referências

Cyberspace in the current security environment

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20210015410</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20211228174953.0</controlfield>
    <controlfield tag="008">210601e20210501esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20210007927</subfield>
      <subfield code="a">Diego James Cano Prentice</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Cyberspace in the current security environment</subfield>
      <subfield code="c">Diego James Cano Prentice</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Cyber is a newcomer to humankind's long history of warfare, yet most countries have been quick to recognise it militarily. Cyber appears in several military strategic concepts, it is considered as a domain of operations by NATO and the U.S., and several countries have created a dedicated cyber combatant command. This essay sets out to offer a brief account of cyberspace's evolution, significance and direction in political-military thought.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080557515</subfield>
      <subfield code="a">Cibernética</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587581</subfield>
      <subfield code="a">Riesgo informático</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000383</subfield>
      <subfield code="t">Actuarios</subfield>
      <subfield code="d">Madrid : Instituto de Actuarios Españoles, 1990-</subfield>
      <subfield code="g">01/05/2021 Número 48 - mayo 2021 , p. 26-27</subfield>
    </datafield>
    <datafield tag="856" ind1=" " ind2=" ">
      <subfield code="q">application/pdf</subfield>
      <subfield code="w">1111211</subfield>
      <subfield code="y">Recurso electrónico / Electronic resource</subfield>
    </datafield>
  </record>
</collection>