This HTML5 document contains 21 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n7http://www.idref.fr/028960963/
marcrelhttp://id.loc.gov/vocabulary/relators/
dctermshttp://purl.org/dc/terms/
n15http://www.idref.fr/140846190/
dchttp://purl.org/dc/elements/1.1/
n2http://www.idref.fr/215631412/
n12http://www.idref.fr/027673006/
rdauhttp://rdaregistry.info/Elements/u/
skoshttp://www.w3.org/2004/02/skos/core#
n17http://lexvo.org/id/iso639-3/
n11http://iflastandards.info/ns/isbd/terms/contentform/
rdachttp://rdaregistry.info/Elements/c/
n13http://www.idref.fr/10373578X/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
frbrhttp://purl.org/vocab/frbr/core#
n10http://iflastandards.info/ns/isbd/elements/
n9http://rdaregistry.info/termList/RDAContentType/
rdawhttp://rdaregistry.info/Elements/w/
xsdhhttp://www.w3.org/2001/XMLSchema#
Subject Item
n2:id
rdf:type
frbr:Work rdac:C10001
marcrel:aut
n15:id
dc:subject
Guerre de l'information Information warfare Cyberterrorism Criminalité informatique Computer crimes Cyberterrorisme Terrorism
skos:prefLabel
Inside cyber warfare
dcterms:language
n17:eng
dcterms:subject
n7:id n12:id n13:id
dc:title
Inside cyber warfare
skos:note
\"You may have heard about \"cyber warfare\" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009. Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine; discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations; read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival; find out why many attacks originate from servers in the United States, and who's responsible; and, learn how hackers are \"weaponizing\" malware to attack vulnerabilities at the application level\"--4e de couverture
dc:type
Text
n10:P1001
n11:T1009
rdaw:P10219
2010
rdau:P60049
n9:1020