dc.contributor.author |
Janczewski, Lech |
en |
dc.contributor.author |
Colarik, AM |
en |
dc.contributor.editor |
Janczewski, LJ |
en |
dc.contributor.editor |
Colarik, AM |
en |
dc.date.accessioned |
2012-05-31T02:59:12Z |
en |
dc.date.accessioned |
2020-04-02T22:42:59Z |
en |
dc.date.issued |
2007 |
en |
dc.identifier.citation |
Editors: Janczewski LJ, Colarik AM. 1-532. Idea Group Reference, New York 2007 |
en |
dc.identifier.isbn |
1591409918 |
en |
dc.identifier.isbn |
978-159140991-5 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/50195 |
en |
dc.description.uri |
http://librarysearch.auckland.ac.nz/primo_library/libweb/action/display.do?fn=search&doc=uoa_voyager1756891&vid=UOA2_A |
en |
dc.format.medium |
hardcopy |
en |
dc.publisher |
Idea Group Reference |
en |
dc.relation.replaces |
http://hdl.handle.net/2292/18830 |
en |
dc.relation.replaces |
2292/18830 |
en |
dc.relation.replaces |
2292/11745 |
en |
dc.relation.replaces |
http://hdl.handle.net/2292/11745 |
en |
dc.relation.replaces |
2292/11745 |
en |
dc.relation.replaces |
http://hdl.handle.net/2292/11745 |
en |
dc.relation.replaces |
2292/11745 |
en |
dc.relation.replaces |
http://hdl.handle.net/2292/11745 |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
Cyber Warfare and Cyber Terrorism |
en |
dc.type |
Book |
en |
pubs.begin-page |
1 |
en |
dc.rights.holder |
Copyright: Idea Group Reference |
en |
pubs.declined |
2016-08-17T16:16:58.370+1200 |
en |
pubs.declined |
2016-08-18T19:26:40.231+1200 |
en |
pubs.declined |
2016-08-19T16:05:36.330+1200 |
en |
pubs.declined |
2016-08-21T20:42:40.228+1200 |
en |
pubs.declined |
2016-08-22T16:10:34.554+1200 |
en |
pubs.declined |
2016-08-23T16:10:15.403+1200 |
en |
pubs.declined |
2016-08-24T17:06:12.856+1200 |
en |
pubs.declined |
2016-08-25T16:08:28.743+1200 |
en |
pubs.declined |
2016-08-26T16:41:04.452+1200 |
en |
pubs.declined |
2016-08-27T16:34:52.290+1200 |
en |
pubs.declined |
2016-08-28T16:40:05.291+1200 |
en |
pubs.declined |
2016-08-29T16:12:07.954+1200 |
en |
pubs.declined |
2016-08-30T16:06:45.9+1200 |
en |
pubs.declined |
2016-08-31T16:08:07.221+1200 |
en |
pubs.declined |
2016-09-01T16:18:39.474+1200 |
en |
pubs.declined |
2016-09-02T16:19:42.309+1200 |
en |
pubs.declined |
2016-09-03T17:21:21.156+1200 |
en |
pubs.declined |
2016-09-04T18:15:21.191+1200 |
en |
pubs.declined |
2016-09-05T18:37:52.549+1200 |
en |
pubs.declined |
2016-09-06T20:51:50.629+1200 |
en |
pubs.declined |
2016-12-05T18:27:38.42+1300 |
en |
pubs.declined |
2016-12-17T18:34:47.658+1300 |
en |
pubs.declined |
2017-06-25T18:31:47.809+1200 |
en |
pubs.declined |
2017-09-03T20:16:03.353+1200 |
en |
pubs.declined |
2017-11-26T18:56:03.507+1300 |
en |
pubs.declined |
2018-02-11T18:49:25.397+1300 |
en |
pubs.declined |
2019-06-30T17:19:46.527+1200 |
en |
pubs.declined |
2019-09-08T17:39:08.255+1200 |
en |
pubs.declined |
2019-12-22T17:04:43.602+1300 |
en |
pubs.declined |
2020-02-02T19:19:33.723+1300 |
en |
pubs.end-page |
532 |
en |
pubs.merge-from |
2292/11745 |
en |
pubs.merge-from |
http://hdl.handle.net/2292/11745 |
en |
pubs.place-of-publication |
New York |
en |
pubs.publication-status |
Published |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Book |
en |
pubs.elements-id |
85131 |
en |
pubs.org-id |
Business and Economics |
en |
pubs.org-id |
Info Systems & Operations Mgmt |
en |
pubs.record-created-at-source-date |
2010-09-01 |
en |