The virtual battlefield: perspectives on cyber warfare:
"All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Ios Press
2009
|
Schriftenreihe: | Cryptology and information security series
3 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections--Strategic viewpoints and Technical challenges & solutions--and highlights the growing connection between computer security and national security"--P. 4 of cover. |
Beschreibung: | 305 S. Ill., graph. Darst., Kt. |
ISBN: | 9781607500605 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035977918 | ||
003 | DE-604 | ||
005 | 20100301 | ||
007 | t | ||
008 | 100127s2009 abd| |||| 00||| eng d | ||
020 | |a 9781607500605 |9 978-1-60750-060-5 | ||
020 | |z 1607500604 |9 1607500604 | ||
035 | |a (OCoLC)489010240 | ||
035 | |a (DE-599)BVBBV035977918 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
050 | 0 | |a U163 | |
084 | |a 8 |2 ssgn | ||
245 | 1 | 0 | |a The virtual battlefield: perspectives on cyber warfare |c ed. by Christian Czosseck ... [Authors: Luc Beaudoin ...] |
264 | 1 | |a Amsterdam [u.a.] |b Ios Press |c 2009 | |
300 | |a 305 S. |b Ill., graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Cryptology and information security series |v 3 | |
520 | 1 | |a "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections--Strategic viewpoints and Technical challenges & solutions--and highlights the growing connection between computer security and national security"--P. 4 of cover. | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Information warfare | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Czosseck, Christian |e Sonstige |0 (DE-588)140614117 |4 oth | |
700 | 1 | |a Beaudoin, Luc |e Sonstige |0 (DE-588)140614206 |4 oth | |
830 | 0 | |a Cryptology and information security series |v 3 |w (DE-604)BV035771847 |9 3 | |
856 | 4 | 2 | |m Digitalisierung BSBMuenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018871865&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018871865 |
Datensatz im Suchindex
_version_ | 1804140999150141440 |
---|---|
adam_text | XIX
Contents
Preface
v
Kenneth
Geers
About the Contributors
xiii
Part I. Strategic Viewpoints
Cyber Wars: A Paradigm Shift from Means to Ends
3
Amit Sharma
Towards an Evolving Theory of Cyberpower
18
Stuart H. Starr
Sub Rosa Cyber War
53
Martin C. Libicki
Warfare and the Continuum of Cyber Risks: A Policy Perspective
66
Andrew Cutts
Cyber Terrorism: A New Dimension in Battlespace
77
J.P.LA.G.
Charvát
Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber
Security?
88
Forrest Hare
Towards a Global Regime for Cyber Warfare
106
Rex Hughes
What Analogies Can Tell Us About the Future of Cybersecuriry
118
David
Sulek
and Ned
Moran
The Information Sphere Domain
-
Increasing Understanding and Cooperation
132
Patrick D. Allen and Dennis P. Gilbert Jr.
Sun Tzu Was a Hacker: An Examination of the Tactics and Operations from
a Real World Cyber Attack
143
Billy
K. Rios
Belarus in the Context of European Cyber Security
156
Fyodor Pavlyuchenko
Politically Motivated Denial of Service Attacks
163
Jose Nazario
A Brief Examination of Media Coverage of Cyberattacks
(2007 -
Present)
182
Cyrus Farivar
XX
Part
П.
Technical Challenges and Solutions
Behavioral Analysis of Zombie Armies
191
Olivier Thonnard,
Wim
Mees
and
Marc Dacier
Proactive Botnet Countermeasures
-
An Offensive Approach
211
Felix
Leder, Tillmann
Werner and Peter Martini
When Not to Pull the Plug
-
The Need for Network Counter-Surveillance
Operations
226
Scott Knight and
Sylvain Leblanc
Autonomie
Computer Network Defence Using Risk State and Reinforcement
Learning
238
Luc Beaudoin, Nathalie Japkowicz and Stan Matwin
Enhancing Graph-Based Automated DoS Attack Response
249
Gabriel
Klein, Marko Jahnke, Jens Tolle
and Peter Martini
On n* Order Attacks
262
Daniel
Bilar
Business and Social Evaluation of Denial of Service Attacks in View of Scaling
Economic Counter-Measures
282
Louis-Francois
Pau
Virtual Plots, Real Revolution
294
Roelof
Temmingh and Kenneth Geers
Subject Index
303
Author Index
305
|
any_adam_object | 1 |
author_GND | (DE-588)140614117 (DE-588)140614206 |
building | Verbundindex |
bvnumber | BV035977918 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)489010240 (DE-599)BVBBV035977918 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02439nam a2200433 cb4500</leader><controlfield tag="001">BV035977918</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100301 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100127s2009 abd| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607500605</subfield><subfield code="9">978-1-60750-060-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1607500604</subfield><subfield code="9">1607500604</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)489010240</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035977918</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The virtual battlefield: perspectives on cyber warfare</subfield><subfield code="c">ed. by Christian Czosseck ... [Authors: Luc Beaudoin ...]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Ios Press</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">305 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">3</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections--Strategic viewpoints and Technical challenges & solutions--and highlights the growing connection between computer security and national security"--P. 4 of cover.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Czosseck, Christian</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)140614117</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Beaudoin, Luc</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)140614206</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series</subfield><subfield code="v">3</subfield><subfield code="w">(DE-604)BV035771847</subfield><subfield code="9">3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018871865&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018871865</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035977918 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:08:54Z |
institution | BVB |
isbn | 9781607500605 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018871865 |
oclc_num | 489010240 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | 305 S. Ill., graph. Darst., Kt. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Ios Press |
record_format | marc |
series | Cryptology and information security series |
series2 | Cryptology and information security series |
spelling | The virtual battlefield: perspectives on cyber warfare ed. by Christian Czosseck ... [Authors: Luc Beaudoin ...] Amsterdam [u.a.] Ios Press 2009 305 S. Ill., graph. Darst., Kt. txt rdacontent n rdamedia nc rdacarrier Cryptology and information security series 3 "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections--Strategic viewpoints and Technical challenges & solutions--and highlights the growing connection between computer security and national security"--P. 4 of cover. Computer crimes Cyberterrorism Information warfare Information warfare (DE-588)4461975-3 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s DE-604 Czosseck, Christian Sonstige (DE-588)140614117 oth Beaudoin, Luc Sonstige (DE-588)140614206 oth Cryptology and information security series 3 (DE-604)BV035771847 3 Digitalisierung BSBMuenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018871865&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | The virtual battlefield: perspectives on cyber warfare Cryptology and information security series Computer crimes Cyberterrorism Information warfare Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4143413-4 |
title | The virtual battlefield: perspectives on cyber warfare |
title_auth | The virtual battlefield: perspectives on cyber warfare |
title_exact_search | The virtual battlefield: perspectives on cyber warfare |
title_full | The virtual battlefield: perspectives on cyber warfare ed. by Christian Czosseck ... [Authors: Luc Beaudoin ...] |
title_fullStr | The virtual battlefield: perspectives on cyber warfare ed. by Christian Czosseck ... [Authors: Luc Beaudoin ...] |
title_full_unstemmed | The virtual battlefield: perspectives on cyber warfare ed. by Christian Czosseck ... [Authors: Luc Beaudoin ...] |
title_short | The virtual battlefield: perspectives on cyber warfare |
title_sort | the virtual battlefield perspectives on cyber warfare |
topic | Computer crimes Cyberterrorism Information warfare Information warfare (DE-588)4461975-3 gnd |
topic_facet | Computer crimes Cyberterrorism Information warfare Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018871865&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035771847 |
work_keys_str_mv | AT czosseckchristian thevirtualbattlefieldperspectivesoncyberwarfare AT beaudoinluc thevirtualbattlefieldperspectivesoncyberwarfare |