000262657 000__ 01270cam\a2200325La\4500 000262657 001__ 262657 000262657 005__ 20210513101029.0 000262657 006__ m\\\\\o\\d\\\\\\\\ 000262657 007__ cr\cn\nnnunnun 000262657 008__ 020105s2001\\\\nyu\\\\\o\\\\\001\0\eng\d 000262657 020__ $$a0072194537 (electronic book) 000262657 035__ $$a(OCoLC)ocm49570070 000262657 035__ $$a262657 000262657 040__ $$aN$T$$cN$T$$dOCLCQ 000262657 05014 $$aU163$$b.E66 2001eb 000262657 08204 $$a005.8$$221 000262657 1001_ $$aErbschloe, Michael,$$d1951- 000262657 24510 $$aInformation warfare$$h[electronic resource] :$$bhow to survive cyber attacks /$$cMichael Erbschloe. 000262657 260__ $$aNew York :$$bOsborne/McGraw-Hill,$$cc2001. 000262657 300__ $$a1 online resource (xx, 315 p.) 000262657 500__ $$aIncludes index. 000262657 506__ $$aAccess limited to authorized users. 000262657 588__ $$aDescription based on print version record. 000262657 650_0 $$aInformation warfare. 000262657 650_0 $$aCyberterrorism. 000262657 650_0 $$aComputer crimes. 000262657 77608 $$iPrint version:$$aErbschloe, Michael, 1951-$$tInformation warfare.$$dNew York : Osborne/McGraw-Hill, c2001$$z0072194537$$w(DLC) 2001278342$$w(OCoLC)47888713 000262657 85280 $$bebk$$hEBSCOhost 000262657 85640 $$3EBSCOhost$$uhttps://univsouthin.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=65943$$zOnline Access 000262657 909CO $$ooai:library.usi.edu:262657$$pGLOBAL_SET 000262657 980__ $$aEBOOK 000262657 980__ $$aBIB 000262657 982__ $$aEbook 000262657 983__ $$aOnline