Introduction to cyber-warfare: a multidisciplinary approach
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Syngress Publ.
2013
|
Schlagworte: | |
Online-Zugang: | FAW01 FLA01 FUBA1 Volltext |
Beschreibung: | Includes bibliographical references and index Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent |
Beschreibung: | 1 Online-Ressource (XVII, 318 S.) Ill., graph. Darst. |
ISBN: | 9780124079267 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV042314326 | ||
003 | DE-604 | ||
005 | 20231102 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124079267 |c electronic bk. |9 978-0-12-407926-7 | ||
024 | 7 | |a 10.1016/C2012-0-06618-5 |2 doi | |
035 | |a (ZDB-4-EBA)ocn846492852 | ||
035 | |a (ZDB-4-ITC)ocn846492852 | ||
035 | |a (OCoLC)846492852 | ||
035 | |a (DE-599)BVBBV042314326 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-188 | ||
082 | 0 | |a 355.4 |2 23 | |
100 | 1 | |a Shakarian, Paulo |d 1980- |e Verfasser |0 (DE-588)1234085496 |4 aut | |
245 | 1 | 0 | |a Introduction to cyber-warfare |b a multidisciplinary approach |c Paulo Shakarian ; Jana Shakarian ; Andrew Ruef |
264 | 1 | |a Amsterdam [u.a.] |b Syngress Publ. |c 2013 | |
300 | |a 1 Online-Ressource (XVII, 318 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent | ||
650 | 7 | |a HISTORY / Military / Strategy |2 bisacsh | |
650 | 4 | |a Information warfare |v Case studies | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shakarian, Jana |d 1977- |e Verfasser |0 (DE-588)1234085062 |4 aut | |
700 | 1 | |a Ruef, Andrew |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-12-407814-7 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124078147 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-4-EBA |a ZDB-33-EBS |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027751317 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124078147 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124078147 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124078147 |l FUBA1 |p ZDB-33-ESD |q ZDB-33-ESD 2021 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152907360108544 |
---|---|
any_adam_object | |
author | Shakarian, Paulo 1980- Shakarian, Jana 1977- Ruef, Andrew |
author_GND | (DE-588)1234085496 (DE-588)1234085062 |
author_facet | Shakarian, Paulo 1980- Shakarian, Jana 1977- Ruef, Andrew |
author_role | aut aut aut |
author_sort | Shakarian, Paulo 1980- |
author_variant | p s ps j s js a r ar |
building | Verbundindex |
bvnumber | BV042314326 |
collection | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn846492852 (ZDB-4-ITC)ocn846492852 (OCoLC)846492852 (DE-599)BVBBV042314326 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04012nmm a2200541 c 4500</leader><controlfield tag="001">BV042314326</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231102 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124079267</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-407926-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2012-0-06618-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn846492852</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn846492852</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846492852</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314326</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shakarian, Paulo</subfield><subfield code="d">1980-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1234085496</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to cyber-warfare</subfield><subfield code="b">a multidisciplinary approach</subfield><subfield code="c">Paulo Shakarian ; Jana Shakarian ; Andrew Ruef</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Syngress Publ.</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 318 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Military / Strategy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Jana</subfield><subfield code="d">1977-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1234085062</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruef, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-12-407814-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124078147</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-33-EBS</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751317</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124078147</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124078147</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124078147</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">ZDB-33-ESD 2021</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV042314326 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9780124079267 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751317 |
oclc_num | 846492852 |
open_access_boolean | |
owner | DE-1046 DE-188 |
owner_facet | DE-1046 DE-188 |
physical | 1 Online-Ressource (XVII, 318 S.) Ill., graph. Darst. |
psigel | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD ZDB-33-ESD 2021 |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress Publ. |
record_format | marc |
spelling | Shakarian, Paulo 1980- Verfasser (DE-588)1234085496 aut Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian ; Jana Shakarian ; Andrew Ruef Amsterdam [u.a.] Syngress Publ. 2013 1 Online-Ressource (XVII, 318 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent HISTORY / Military / Strategy bisacsh Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd rswk-swf (DE-588)4522595-3 Fallstudiensammlung gnd-content Information warfare (DE-588)4461975-3 s DE-604 Shakarian, Jana 1977- Verfasser (DE-588)1234085062 aut Ruef, Andrew Verfasser aut Erscheint auch als Druck-Ausgabe 978-0-12-407814-7 http://www.sciencedirect.com/science/book/9780124078147 Verlag Volltext |
spellingShingle | Shakarian, Paulo 1980- Shakarian, Jana 1977- Ruef, Andrew Introduction to cyber-warfare a multidisciplinary approach HISTORY / Military / Strategy bisacsh Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4522595-3 |
title | Introduction to cyber-warfare a multidisciplinary approach |
title_auth | Introduction to cyber-warfare a multidisciplinary approach |
title_exact_search | Introduction to cyber-warfare a multidisciplinary approach |
title_full | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian ; Jana Shakarian ; Andrew Ruef |
title_fullStr | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian ; Jana Shakarian ; Andrew Ruef |
title_full_unstemmed | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian ; Jana Shakarian ; Andrew Ruef |
title_short | Introduction to cyber-warfare |
title_sort | introduction to cyber warfare a multidisciplinary approach |
title_sub | a multidisciplinary approach |
topic | HISTORY / Military / Strategy bisacsh Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd |
topic_facet | HISTORY / Military / Strategy Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare Fallstudiensammlung |
url | http://www.sciencedirect.com/science/book/9780124078147 |
work_keys_str_mv | AT shakarianpaulo introductiontocyberwarfareamultidisciplinaryapproach AT shakarianjana introductiontocyberwarfareamultidisciplinaryapproach AT ruefandrew introductiontocyberwarfareamultidisciplinaryapproach |