Cyber blockades:
This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means,...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Washington
Georgetown Univ. Press
2014
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise render cyberspace useless for an entire country, and Russell also seeks to understand the implications of cyber blockades for international relations. A cyber blockade can be either a legitimate or illegitimate tool depending on the circumstances. What is certain is that the state on the receiving end faces a serious threat to its political, military, economic, and social stability. The book includes two in-depth case studies of cyber blockades, Estonia in 2007 and Georgia in 2008, both of which suffered cyber attacks from Russia. Russell compares cyber blockades with those in other domains (sea, land, air, and space) and offers recommendations for policymakers and for further academic study |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XIV, 175 S. |
ISBN: | 9781626161115 9781626161122 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042196399 | ||
003 | DE-604 | ||
005 | 20150119 | ||
007 | t | ||
008 | 141119s2014 xxu |||| 00||| eng d | ||
010 | |a 014011280 | ||
020 | |a 9781626161115 |9 978-1-62616-111-5 | ||
020 | |a 9781626161122 |c paperback |9 978-1-62616-112-2 | ||
035 | |a (OCoLC)898048988 | ||
035 | |a (DE-599)BVBBV042196399 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 327.1/17 |2 23 | |
100 | 1 | |a Russell, Alison Lawlor |e Verfasser |0 (DE-588)1063385644 |4 aut | |
245 | 1 | 0 | |a Cyber blockades |c Alison Lawlor Russell |
264 | 1 | |a Washington |b Georgetown Univ. Press |c 2014 | |
300 | |a XIV, 175 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise render cyberspace useless for an entire country, and Russell also seeks to understand the implications of cyber blockades for international relations. A cyber blockade can be either a legitimate or illegitimate tool depending on the circumstances. What is certain is that the state on the receiving end faces a serious threat to its political, military, economic, and social stability. The book includes two in-depth case studies of cyber blockades, Estonia in 2007 and Georgia in 2008, both of which suffered cyber attacks from Russia. Russell compares cyber blockades with those in other domains (sea, land, air, and space) and offers recommendations for policymakers and for further academic study | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9781626161139 |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027635375&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027635375 |
Datensatz im Suchindex
_version_ | 1804152710669271040 |
---|---|
adam_text | CYBER BLOCKADES
/ RUSSELL, ALISON LAWLOR [AUTHOR.]
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CONTENTS
LIST OF TABLES AND FIGURES
ACKNOWLEDGMENTS
LIST OF ABBREVIATIONS AND ACRONYMS
NETWORKS OF POWER IN THE INFORMATION SOCIETY
THEORIZING ABOUT CYBERSPACE
EVOLUTION OF BLOCKADES IN DIFFERENT DOMAINS
CYBER ATTACKS ON ESTONIA
THE GEORGIA-RUSSIA WAR
COMPARING CYBER BLOCKADES
CONCLUSION
GLOSSARY
BIBLIOGRAPHY
INDEX
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Russell, Alison Lawlor |
author_GND | (DE-588)1063385644 |
author_facet | Russell, Alison Lawlor |
author_role | aut |
author_sort | Russell, Alison Lawlor |
author_variant | a l r al alr |
building | Verbundindex |
bvnumber | BV042196399 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)898048988 (DE-599)BVBBV042196399 |
dewey-full | 327.1/17 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.1/17 |
dewey-search | 327.1/17 |
dewey-sort | 3327.1 217 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02943nam a2200493 c 4500</leader><controlfield tag="001">BV042196399</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150119 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">141119s2014 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">014011280</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626161115</subfield><subfield code="9">978-1-62616-111-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626161122</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-62616-112-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)898048988</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042196399</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.1/17</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Russell, Alison Lawlor</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1063385644</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber blockades</subfield><subfield code="c">Alison Lawlor Russell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington</subfield><subfield code="b">Georgetown Univ. Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 175 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise render cyberspace useless for an entire country, and Russell also seeks to understand the implications of cyber blockades for international relations. A cyber blockade can be either a legitimate or illegitimate tool depending on the circumstances. What is certain is that the state on the receiving end faces a serious threat to its political, military, economic, and social stability. The book includes two in-depth case studies of cyber blockades, Estonia in 2007 and Georgia in 2008, both of which suffered cyber attacks from Russia. Russell compares cyber blockades with those in other domains (sea, land, air, and space) and offers recommendations for policymakers and for further academic study</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9781626161139</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027635375&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027635375</subfield></datafield></record></collection> |
id | DE-604.BV042196399 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:15:03Z |
institution | BVB |
isbn | 9781626161115 9781626161122 |
language | English |
lccn | 014011280 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027635375 |
oclc_num | 898048988 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XIV, 175 S. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Georgetown Univ. Press |
record_format | marc |
spelling | Russell, Alison Lawlor Verfasser (DE-588)1063385644 aut Cyber blockades Alison Lawlor Russell Washington Georgetown Univ. Press 2014 XIV, 175 S. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise render cyberspace useless for an entire country, and Russell also seeks to understand the implications of cyber blockades for international relations. A cyber blockade can be either a legitimate or illegitimate tool depending on the circumstances. What is certain is that the state on the receiving end faces a serious threat to its political, military, economic, and social stability. The book includes two in-depth case studies of cyber blockades, Estonia in 2007 and Georgia in 2008, both of which suffered cyber attacks from Russia. Russell compares cyber blockades with those in other domains (sea, land, air, and space) and offers recommendations for policymakers and for further academic study Cyberterrorism Cyberterrorism Prevention Cyberspace Security measures Computer security Sicherheit (DE-588)4054790-5 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Internet (DE-588)4308416-3 s Terrorismus (DE-588)4059534-1 s Sicherheit (DE-588)4054790-5 s DE-604 Erscheint auch als Online-Ausgabe 9781626161139 LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027635375&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Russell, Alison Lawlor Cyber blockades Cyberterrorism Cyberterrorism Prevention Cyberspace Security measures Computer security Sicherheit (DE-588)4054790-5 gnd Terrorismus (DE-588)4059534-1 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4059534-1 (DE-588)4308416-3 |
title | Cyber blockades |
title_auth | Cyber blockades |
title_exact_search | Cyber blockades |
title_full | Cyber blockades Alison Lawlor Russell |
title_fullStr | Cyber blockades Alison Lawlor Russell |
title_full_unstemmed | Cyber blockades Alison Lawlor Russell |
title_short | Cyber blockades |
title_sort | cyber blockades |
topic | Cyberterrorism Cyberterrorism Prevention Cyberspace Security measures Computer security Sicherheit (DE-588)4054790-5 gnd Terrorismus (DE-588)4059534-1 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Cyberterrorism Cyberterrorism Prevention Cyberspace Security measures Computer security Sicherheit Terrorismus Internet |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027635375&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT russellalisonlawlor cyberblockades |