Surviving cyberwar:
He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Lanham, Md. [u.a.]
Government Institutes
2010
|
Schlagworte: | |
Zusammenfassung: | He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries. |
Beschreibung: | Includes bibliographical references (p. 157-164) and index |
Beschreibung: | IX, 170 S. |
ISBN: | 9781605906744 9781605906881 9781605906751 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036726084 | ||
003 | DE-604 | ||
005 | 20140115 | ||
007 | t | ||
008 | 101018s2010 |||| 00||| eng d | ||
020 | |a 9781605906744 |9 978-1-60590-674-4 | ||
020 | |a 9781605906881 |9 978-1-60590-688-1 | ||
020 | |a 9781605906751 |9 978-1-60590-675-1 | ||
035 | |a (OCoLC)705910718 | ||
035 | |a (DE-599)BVBBV036726084 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-188 | ||
050 | 0 | |a U163.S73 | |
082 | 0 | |a 355.343 | |
100 | 1 | |a Stiennon, Richard |d 1959- |e Verfasser |0 (DE-588)1046386530 |4 aut | |
245 | 1 | 0 | |a Surviving cyberwar |c Richard Stiennon |
264 | 1 | |a Lanham, Md. [u.a.] |b Government Institutes |c 2010 | |
300 | |a IX, 170 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 157-164) and index | ||
505 | 0 | |a Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions | |
520 | |a He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries. | ||
650 | 4 | |a Information warfare / United States | |
650 | 4 | |a Cyberterrorism / United States / Prevention | |
650 | 4 | |a Cyberspace / Security measures | |
650 | 4 | |a Computer networks / Security measures / United States | |
650 | 4 | |a Civil defense / United States | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-020643848 |
Datensatz im Suchindex
_version_ | 1804143376880107520 |
---|---|
any_adam_object | |
author | Stiennon, Richard 1959- |
author_GND | (DE-588)1046386530 |
author_facet | Stiennon, Richard 1959- |
author_role | aut |
author_sort | Stiennon, Richard 1959- |
author_variant | r s rs |
building | Verbundindex |
bvnumber | BV036726084 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163.S73 |
callnumber-search | U163.S73 |
callnumber-sort | U 3163 S73 |
callnumber-subject | U - General Military Science |
contents | Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions |
ctrlnum | (OCoLC)705910718 (DE-599)BVBBV036726084 |
dewey-full | 355.343 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.343 |
dewey-search | 355.343 |
dewey-sort | 3355.343 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02698nam a2200445 c 4500</leader><controlfield tag="001">BV036726084</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140115 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">101018s2010 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605906744</subfield><subfield code="9">978-1-60590-674-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605906881</subfield><subfield code="9">978-1-60590-688-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605906751</subfield><subfield code="9">978-1-60590-675-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)705910718</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036726084</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163.S73</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.343</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stiennon, Richard</subfield><subfield code="d">1959-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1046386530</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Surviving cyberwar</subfield><subfield code="c">Richard Stiennon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Lanham, Md. [u.a.]</subfield><subfield code="b">Government Institutes</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 170 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 157-164) and index</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a"> He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries. </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / United States / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Civil defense / United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020643848</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV036726084 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:46:41Z |
institution | BVB |
isbn | 9781605906744 9781605906881 9781605906751 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020643848 |
oclc_num | 705910718 |
open_access_boolean | |
owner | DE-12 DE-188 |
owner_facet | DE-12 DE-188 |
physical | IX, 170 S. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Government Institutes |
record_format | marc |
spelling | Stiennon, Richard 1959- Verfasser (DE-588)1046386530 aut Surviving cyberwar Richard Stiennon Lanham, Md. [u.a.] Government Institutes 2010 IX, 170 S. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references (p. 157-164) and index Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries. Information warfare / United States Cyberterrorism / United States / Prevention Cyberspace / Security measures Computer networks / Security measures / United States Civil defense / United States Information warfare (DE-588)4461975-3 gnd rswk-swf USA Information warfare (DE-588)4461975-3 s DE-604 |
spellingShingle | Stiennon, Richard 1959- Surviving cyberwar Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions Information warfare / United States Cyberterrorism / United States / Prevention Cyberspace / Security measures Computer networks / Security measures / United States Civil defense / United States Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 |
title | Surviving cyberwar |
title_auth | Surviving cyberwar |
title_exact_search | Surviving cyberwar |
title_full | Surviving cyberwar Richard Stiennon |
title_fullStr | Surviving cyberwar Richard Stiennon |
title_full_unstemmed | Surviving cyberwar Richard Stiennon |
title_short | Surviving cyberwar |
title_sort | surviving cyberwar |
topic | Information warfare / United States Cyberterrorism / United States / Prevention Cyberspace / Security measures Computer networks / Security measures / United States Civil defense / United States Information warfare (DE-588)4461975-3 gnd |
topic_facet | Information warfare / United States Cyberterrorism / United States / Prevention Cyberspace / Security measures Computer networks / Security measures / United States Civil defense / United States Information warfare USA |
work_keys_str_mv | AT stiennonrichard survivingcyberwar |