000731638 000__ 01514cam\a2200373\i\4500 000731638 001__ 731638 000731638 005__ 20210515110108.0 000731638 006__ m\\\\\o\\d\\\\\\\\ 000731638 007__ cr\cn\nnnunnun 000731638 008__ 150706t20152015caua\\\\ob\\\\000\0\eng\d 000731638 020__ $$z9780833089113 000731638 020__ $$a9780833091031$$qelectronic book 000731638 035__ $$a(CaPaEBR)ebr11068409 000731638 040__ $$aCaPaEBR$$beng$$erda$$epn$$cCaPaEBR 000731638 05014 $$aHV6773$$b.L53 2015eb 000731638 1001_ $$aLibicki, Martin C.,$$eauthor. 000731638 24514 $$aThe defender's dilemma$$h[electronic resource] :$$bcharting a course toward cybersecurity /$$cMartin C. Libicki, Lillian Ablon, Tim Webb. 000731638 264_1 $$aSanta Monica, California :$$bRAND Corporation,$$c[2015] 000731638 264_4 $$c©2015 000731638 300__ $$a1 online resource (162 pages) :$$billustrations 000731638 336__ $$atext$$2rdacontent 000731638 337__ $$acomputer$$2rdamedia 000731638 338__ $$aonline resource$$2rdacarrier 000731638 504__ $$aIncludes bibliographical references. 000731638 506__ $$aAccess limited to authorized users. 000731638 588__ $$aDescription based on online resource; title from PDF title page (ebrary, viewed July 7, 2015). 000731638 650_0 $$aCyberterrorism$$xPrevention. 000731638 650_0 $$aComputer networks$$xSecurity measures. 000731638 650_0 $$aComputer security. 000731638 7001_ $$aAblon, Lillian,$$eauthor. 000731638 7001_ $$aWebb, Tim$$c(Children's story adapter),$$eauthor. 000731638 85280 $$bebk$$hEbrary Academic Complete 000731638 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=11068409$$zOnline Access 000731638 909CO $$ooai:library.usi.edu:731638$$pGLOBAL_SET 000731638 980__ $$aEBOOK 000731638 980__ $$aBIB 000731638 982__ $$aEbook 000731638 983__ $$aOnline