Cyber war versus cyber realities: cyber conflict in the international system
"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range o...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY [u.a.]
Oxford Univ. Press
2015
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--"What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest |
Beschreibung: | Machine generated contents note: -- Preface -- Acknowledgements -- Chapter 1: The Contours of the Cyber Conflict World -- Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations -- Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists -- Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus -- Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations -- Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear -- Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- Chapter 9: Conclusion -- Tables and Figures |
Beschreibung: | XIV, 266 S. Ill., graph. Darst., Kt. |
ISBN: | 9780190204792 0190204796 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042607530 | ||
003 | DE-604 | ||
005 | 20200615 | ||
007 | t | ||
008 | 150610s2015 abd| |||| 00||| eng d | ||
020 | |a 9780190204792 |c hardback |9 978-0-19-020479-2 | ||
020 | |a 0190204796 |c hardback |9 0-19-020479-6 | ||
035 | |a (OCoLC)908614100 | ||
035 | |a (DE-599)BVBBV042607530 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-188 |a DE-29 |a DE-355 | ||
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
084 | |a 8 |2 ssgn | ||
100 | 1 | |a Valeriano, Brandon |e Verfasser |0 (DE-588)1135154120 |4 aut | |
245 | 1 | 0 | |a Cyber war versus cyber realities |b cyber conflict in the international system |c Brandon Valeriano and Ryan C. Maness |
264 | 1 | |a New York, NY [u.a.] |b Oxford Univ. Press |c 2015 | |
300 | |a XIV, 266 S. |b Ill., graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Machine generated contents note: -- Preface -- Acknowledgements -- Chapter 1: The Contours of the Cyber Conflict World -- Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations -- Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists -- Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus -- Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations -- Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear -- Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- Chapter 9: Conclusion -- Tables and Figures | ||
520 | |a "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--"What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest | ||
650 | 4 | |a Cyberspace operations (Military science) | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Technology and international relations | |
650 | 4 | |a Internet and international relations | |
650 | 7 | |a POLITICAL SCIENCE / International Relations / General |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / International Security |2 bisacsh | |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationale Politik |0 (DE-588)4072885-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | |5 SWB | |
689 | 1 | 0 | |a Internationale Politik |0 (DE-588)4072885-7 |D s |
689 | 1 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Maness, Ryan C. |e Verfasser |0 (DE-588)1073156915 |4 aut | |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen 22 - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028040471&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-028040471 | ||
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 0905 |
942 | 1 | 1 | |c 302.2 |e 22/bsb |f 0905 |
Datensatz im Suchindex
_version_ | 1804174777600966656 |
---|---|
adam_text | CONTENTS
Preface ix
Acknowledgments xiii
1. The Contours of the Cyber Conflict World 1
2. Cyber Power, Cyber Weapons, and Cyber Operations 20
3. Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber
Terrorism in the Digital Era 45
4. The Dynamics of Cyber Conflict Between Rival Antagonists 78
5. The Impact of Cyber Actions: Cyber Events and the Conflict-Cooperation
Nexus 109
6. Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber
Operations 137
7. Cyber Conflict and Non-State Actors: Weapons of Fear 164
8. Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber
Operations 188
9. Conclusion 209
Appendix: Research Methods 229
Notes 233
References 249
Index 259
|
any_adam_object | 1 |
author | Valeriano, Brandon Maness, Ryan C. |
author_GND | (DE-588)1135154120 (DE-588)1073156915 |
author_facet | Valeriano, Brandon Maness, Ryan C. |
author_role | aut aut |
author_sort | Valeriano, Brandon |
author_variant | b v bv r c m rc rcm |
building | Verbundindex |
bvnumber | BV042607530 |
classification_rvk | SR 850 |
ctrlnum | (OCoLC)908614100 (DE-599)BVBBV042607530 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05127nam a2200565 c 4500</leader><controlfield tag="001">BV042607530</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200615 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150610s2015 abd| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780190204792</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-19-020479-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0190204796</subfield><subfield code="c">hardback</subfield><subfield code="9">0-19-020479-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908614100</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042607530</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Valeriano, Brandon</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1135154120</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber war versus cyber realities</subfield><subfield code="b">cyber conflict in the international system</subfield><subfield code="c">Brandon Valeriano and Ryan C. Maness</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Oxford Univ. Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 266 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Machine generated contents note: -- Preface -- Acknowledgements -- Chapter 1: The Contours of the Cyber Conflict World -- Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations -- Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists -- Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus -- Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations -- Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear -- Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- Chapter 9: Conclusion -- Tables and Figures</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--"What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technology and international relations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet and international relations</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / International Relations / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / International Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationale Politik</subfield><subfield code="0">(DE-588)4072885-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">SWB</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internationale Politik</subfield><subfield code="0">(DE-588)4072885-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maness, Ryan C.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1073156915</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen 22 - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028040471&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028040471</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield></datafield></record></collection> |
id | DE-604.BV042607530 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:05:47Z |
institution | BVB |
isbn | 9780190204792 0190204796 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028040471 |
oclc_num | 908614100 |
open_access_boolean | |
owner | DE-12 DE-188 DE-29 DE-355 DE-BY-UBR |
owner_facet | DE-12 DE-188 DE-29 DE-355 DE-BY-UBR |
physical | XIV, 266 S. Ill., graph. Darst., Kt. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Oxford Univ. Press |
record_format | marc |
spelling | Valeriano, Brandon Verfasser (DE-588)1135154120 aut Cyber war versus cyber realities cyber conflict in the international system Brandon Valeriano and Ryan C. Maness New York, NY [u.a.] Oxford Univ. Press 2015 XIV, 266 S. Ill., graph. Darst., Kt. txt rdacontent n rdamedia nc rdacarrier Machine generated contents note: -- Preface -- Acknowledgements -- Chapter 1: The Contours of the Cyber Conflict World -- Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations -- Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists -- Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus -- Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations -- Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear -- Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- Chapter 9: Conclusion -- Tables and Figures "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--"What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest Cyberspace operations (Military science) Cyberterrorism Technology and international relations Internet and international relations POLITICAL SCIENCE / International Relations / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Internationale Politik (DE-588)4072885-7 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Cyberspace (DE-588)4266146-8 s Information warfare (DE-588)4461975-3 s Sicherheitspolitik (DE-588)4116489-1 s SWB Internationale Politik (DE-588)4072885-7 s DE-604 Maness, Ryan C. Verfasser (DE-588)1073156915 aut Digitalisierung BSB Muenchen 22 - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028040471&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Valeriano, Brandon Maness, Ryan C. Cyber war versus cyber realities cyber conflict in the international system Cyberspace operations (Military science) Cyberterrorism Technology and international relations Internet and international relations POLITICAL SCIENCE / International Relations / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh Sicherheitspolitik (DE-588)4116489-1 gnd Cyberspace (DE-588)4266146-8 gnd Internationale Politik (DE-588)4072885-7 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4116489-1 (DE-588)4266146-8 (DE-588)4072885-7 (DE-588)4461975-3 |
title | Cyber war versus cyber realities cyber conflict in the international system |
title_auth | Cyber war versus cyber realities cyber conflict in the international system |
title_exact_search | Cyber war versus cyber realities cyber conflict in the international system |
title_full | Cyber war versus cyber realities cyber conflict in the international system Brandon Valeriano and Ryan C. Maness |
title_fullStr | Cyber war versus cyber realities cyber conflict in the international system Brandon Valeriano and Ryan C. Maness |
title_full_unstemmed | Cyber war versus cyber realities cyber conflict in the international system Brandon Valeriano and Ryan C. Maness |
title_short | Cyber war versus cyber realities |
title_sort | cyber war versus cyber realities cyber conflict in the international system |
title_sub | cyber conflict in the international system |
topic | Cyberspace operations (Military science) Cyberterrorism Technology and international relations Internet and international relations POLITICAL SCIENCE / International Relations / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh Sicherheitspolitik (DE-588)4116489-1 gnd Cyberspace (DE-588)4266146-8 gnd Internationale Politik (DE-588)4072885-7 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Cyberspace operations (Military science) Cyberterrorism Technology and international relations Internet and international relations POLITICAL SCIENCE / International Relations / General POLITICAL SCIENCE / Political Freedom & Security / International Security Sicherheitspolitik Cyberspace Internationale Politik Information warfare |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028040471&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT valerianobrandon cyberwarversuscyberrealitiescyberconflictintheinternationalsystem AT manessryanc cyberwarversuscyberrealitiescyberconflictintheinternationalsystem |