Cyberspace and the state: toward a strategy for cyber-power
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; New York
Routledge
2011
|
Schriftenreihe: | Adelphi
424 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | 158 Seiten |
ISBN: | 9780415525305 9781138452664 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039715530 | ||
003 | DE-604 | ||
005 | 20171214 | ||
007 | t| | ||
008 | 111121s2011 xx |||| 00||| eng d | ||
020 | |a 9780415525305 |c Pb. |9 978-0-415-52530-5 | ||
020 | |a 9781138452664 |c Hb.: £ 145.00 |9 978-1-138-45266-4 | ||
035 | |a (OCoLC)793004314 | ||
035 | |a (DE-599)GBV67259594X | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-188 |a DE-12 |a DE-706 |a DE-19 | ||
082 | 0 | |a 352.3802854678 | |
084 | |a AP 18420 |0 (DE-625)7052: |2 rvk | ||
084 | |a MF 1000 |0 (DE-625)122658: |2 rvk | ||
084 | |a MS 7850 |0 (DE-625)123798: |2 rvk | ||
084 | |a MS 7965 |0 (DE-625)123801: |2 rvk | ||
084 | |a MD 6500 |2 sdnb | ||
100 | 1 | |a Betz, David J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyberspace and the state |b toward a strategy for cyber-power |c David J. Betz and Tim Stevens |
264 | 1 | |a London ; New York |b Routledge |c 2011 | |
300 | |a 158 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Adelphi |v 424 | |
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-188 | |
700 | 1 | |a Stevens, Tim |d 1973- |e Verfasser |0 (DE-588)1084232294 |4 aut | |
830 | 0 | |a Adelphi |v 424 |w (DE-604)BV035638685 |9 424 | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024563739&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024563739 |
Datensatz im Suchindex
_version_ | 1817907417504022528 |
---|---|
adam_text |
IMAGE 1
CONTENTS
ACKNOWLEDGEMENTS GLOSSARY
INTRODUCTION
IN SEARCH OF ANALYTICAL HIGH GROUND 13 RISE AND DEMISE OF THE HACKER 16
CHAPTER ONE POWER AND CYBERSPACE FROM POWER TO CYBER-POWER 42 COMPULSORY
CYBER-POWER 45 INSTITUTIONAL CYBER-POWER 47 STRUCTURAL CYBER-POWER 48
PRODUCTIVE CYBER-POWER 50
CHAPTER TWO CYBERSPACE AND SOVEREIGNTY INTERNATIONAL LEGAL SOVEREIGNTY
AND CYBERSPACE 58 WESTPHALIAN SOVEREIGNTY AND CYBERSPACE 60 DOMESTIC
SOVEREIGNTY AND CYBERSPACE 63
INTERDEPENDENCE SOVEREIGNTY AND CYBERSPACE 69
CHAPTER THREE CYBERSPACE AND WAR WAR AND INDECISION 77 VISIONS OF FUTURE
WARFARE 79 AIRPOWER REDUX 82
CYBERWAR IS NOT COMING 88
CHAPTER FOUR CYBERSPACE AND DOMINION THE DEATH OF DISTANCE 102 * NEITHER
FISH NOR FOWL NOR CREEPING THING 104 GLOBAL COMMONS, GLOBAL VILLAGE 108
CYBERSPACE AND INSURGENCY 114
CONCLUSION THE AGE OF UNCERTAINTY OR A NEW AGE OF ANXIETY? 126 SOFTLY,
SOFTLY CATCHEE MONKEY. 133
ENDNOTES
6
7
9
35
55
75
99
125
141 |
any_adam_object | 1 |
author | Betz, David J. Stevens, Tim 1973- |
author_GND | (DE-588)1084232294 |
author_facet | Betz, David J. Stevens, Tim 1973- |
author_role | aut aut |
author_sort | Betz, David J. |
author_variant | d j b dj djb t s ts |
building | Verbundindex |
bvnumber | BV039715530 |
classification_rvk | AP 18420 MF 1000 MS 7850 MS 7965 |
ctrlnum | (OCoLC)793004314 (DE-599)GBV67259594X |
dewey-full | 352.3802854678 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 352 - General considerations of public administration |
dewey-raw | 352.3802854678 |
dewey-search | 352.3802854678 |
dewey-sort | 3352.3802854678 |
dewey-tens | 350 - Public administration and military science |
discipline | Allgemeines Politologie Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039715530</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171214</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">111121s2011 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780415525305</subfield><subfield code="c">Pb.</subfield><subfield code="9">978-0-415-52530-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138452664</subfield><subfield code="c">Hb.: £ 145.00</subfield><subfield code="9">978-1-138-45266-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)793004314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV67259594X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">352.3802854678</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 18420</subfield><subfield code="0">(DE-625)7052:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MF 1000</subfield><subfield code="0">(DE-625)122658:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 7850</subfield><subfield code="0">(DE-625)123798:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 7965</subfield><subfield code="0">(DE-625)123801:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MD 6500</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Betz, David J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberspace and the state</subfield><subfield code="b">toward a strategy for cyber-power</subfield><subfield code="c">David J. Betz and Tim Stevens</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York</subfield><subfield code="b">Routledge</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">158 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Adelphi</subfield><subfield code="v">424</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stevens, Tim</subfield><subfield code="d">1973-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1084232294</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Adelphi</subfield><subfield code="v">424</subfield><subfield code="w">(DE-604)BV035638685</subfield><subfield code="9">424</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024563739&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024563739</subfield></datafield></record></collection> |
id | DE-604.BV039715530 |
illustrated | Not Illustrated |
indexdate | 2024-12-08T21:00:13Z |
institution | BVB |
isbn | 9780415525305 9781138452664 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024563739 |
oclc_num | 793004314 |
open_access_boolean | |
owner | DE-188 DE-12 DE-706 DE-19 DE-BY-UBM |
owner_facet | DE-188 DE-12 DE-706 DE-19 DE-BY-UBM |
physical | 158 Seiten |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Routledge |
record_format | marc |
series | Adelphi |
series2 | Adelphi |
spelling | Betz, David J. Verfasser aut Cyberspace and the state toward a strategy for cyber-power David J. Betz and Tim Stevens London ; New York Routledge 2011 158 Seiten txt rdacontent n rdamedia nc rdacarrier Adelphi 424 Hier auch später erschienene, unveränderte Nachdrucke Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s DE-188 Stevens, Tim 1973- Verfasser (DE-588)1084232294 aut Adelphi 424 (DE-604)BV035638685 424 SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024563739&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Betz, David J. Stevens, Tim 1973- Cyberspace and the state toward a strategy for cyber-power Adelphi Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)4274324-2 |
title | Cyberspace and the state toward a strategy for cyber-power |
title_auth | Cyberspace and the state toward a strategy for cyber-power |
title_exact_search | Cyberspace and the state toward a strategy for cyber-power |
title_full | Cyberspace and the state toward a strategy for cyber-power David J. Betz and Tim Stevens |
title_fullStr | Cyberspace and the state toward a strategy for cyber-power David J. Betz and Tim Stevens |
title_full_unstemmed | Cyberspace and the state toward a strategy for cyber-power David J. Betz and Tim Stevens |
title_short | Cyberspace and the state |
title_sort | cyberspace and the state toward a strategy for cyber power |
title_sub | toward a strategy for cyber-power |
topic | Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Internetkriminalität Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024563739&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035638685 |
work_keys_str_mv | AT betzdavidj cyberspaceandthestatetowardastrategyforcyberpower AT stevenstim cyberspaceandthestatetowardastrategyforcyberpower |