Current and emerging trends in cyber operations: policy, strategy and practice
"Cyber operations is an emerging professional and academic field of interest, encompassing multiple disciplines associated with both technical and non-technical operations conducted in cyber space. This book importantly focuses on the non-technical aspects, such as policy, strategy and best pra...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Basingstoke
Palgrave Macmillan
2015
|
Ausgabe: | First published |
Schriftenreihe: | Palgrave Macmillan's studies in cybercrime and cybersecurity
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "Cyber operations is an emerging professional and academic field of interest, encompassing multiple disciplines associated with both technical and non-technical operations conducted in cyber space. This book importantly focuses on the non-technical aspects, such as policy, strategy and best practice. It presents both theoretical and practical approaches towards understanding the evolution of cyber operations. This volume provides a multidisciplinary examination of international trends, with contributions from scholars and high-profile practitioners working in the fields of cyber security, cyber warfare, and information management. It also takes an international approach to these issues, incorporating studies from a military (warfare) context as well as civilian (private industry) environments. Current and Emerging Trends in Cyber Operations is essential reading for policy makers, military personnel, private sector professionals and both senior scholars and students to understand current changes and new issues in cyber operations".. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XIII, 254 pages |
ISBN: | 9781137455543 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042890914 | ||
003 | DE-604 | ||
005 | 20151123 | ||
007 | t | ||
008 | 150925s2015 xxk |||| 00||| eng d | ||
010 | |a 015013078 | ||
020 | |a 9781137455543 |9 978-1-137-45554-3 | ||
035 | |a (OCoLC)934737131 | ||
035 | |a (DE-599)BVBBV042890914 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-12 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 355.4 |2 23 | |
100 | 1 | |a Lemieux, Frédéric |e Verfasser |0 (DE-588)1066715505 |4 aut | |
245 | 1 | 0 | |a Current and emerging trends in cyber operations |b policy, strategy and practice |c edited by Frederic Lemieux |
250 | |a First published | ||
264 | 1 | |a Basingstoke |b Palgrave Macmillan |c 2015 | |
300 | |a XIII, 254 pages | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Palgrave Macmillan's studies in cybercrime and cybersecurity | |
500 | |a Includes bibliographical references and index | ||
520 | |a "Cyber operations is an emerging professional and academic field of interest, encompassing multiple disciplines associated with both technical and non-technical operations conducted in cyber space. This book importantly focuses on the non-technical aspects, such as policy, strategy and best practice. It presents both theoretical and practical approaches towards understanding the evolution of cyber operations. This volume provides a multidisciplinary examination of international trends, with contributions from scholars and high-profile practitioners working in the fields of cyber security, cyber warfare, and information management. It also takes an international approach to these issues, incorporating studies from a military (warfare) context as well as civilian (private industry) environments. Current and Emerging Trends in Cyber Operations is essential reading for policy makers, military personnel, private sector professionals and both senior scholars and students to understand current changes and new issues in cyber operations".. | ||
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / International Security |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE / Criminology |2 bisacsh | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a National security | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a POLITICAL SCIENCE / Political Freedom & Security / International Security | |
650 | 4 | |a SOCIAL SCIENCE / Criminology | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 3 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028319415&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-028319415 |
Datensatz im Suchindex
_version_ | 1804175179677433857 |
---|---|
adam_text | CURRENT AND EMERGING TRENDS IN CYBER OPERATIONS
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
1. TRENDS IN CYBER OPERATIONS: AN INTRODUCTION; FREDERIC LEMIEUX
PART I: CONFLICTS IN CYBER SPACE
2. CYBER CONFLICT: DISRUPTION AND EXPLOITATION IN THE DIGITAL AGE; SCOTT
APPLEGATE
3. ESTABLISHING CYBER WARFARE DOCTRINE; ANDREW COLARIK AND LECH
JANCZEWSKI
4. HOW CYBER CHANGES THE LAWS OF WAR; JACK GOLDSMITH
PART II: GEOPOLITICS OF CONFLICTS IN THE CYBER SPACE
5. RUSSIA S INFORMATION WARFARE CAPABILITIES; ROLAND HEICKEROE
6. THE SINO-U.S. DIGITAL RELATIONSHIP AND INTERNATIONAL CYBER SECURITY;
JYH-AN LEE
7. CYBER OPERATIONS IN THE MIDDLE EAST; JEFFREY BARDIN
PART III: DEFENSE STRATEGIES AND PRACTICES
8. A NATIONAL STRATEGY FOR THE UNITED STATES CYBERSPACE; HAROLD PUNCH
MOULTON, JAMES STAVRIDIS, AND CONSTANCE UTHOFF
9. DEFENDING CRITICAL INFRASTRUCTURES AGAINST CYBER ATTACKS: COOPERATION
THROUGH DATA EXCHANGE INFRASTRUCTURE AND ADVANCED DATA ANALYTICS;
FREDERIC LEMIEUX
10. CYBER SECURITY PROTECTION MEASURES APPLIED IN THE UK AND USA; WAYNE
HARROP AND ASHLEY MATTESON
PART IV: CYBER INTELLIGENCE AND INFORMATION SECURITY
11. TYPOLOGIES OF ATTACKS AND VULNERABILITIES RELATED TO THE NATIONAL
CRITICAL INFRASTRUCTURE; CHARLES PAK
12. OPPORTUNITIES AND SECURITY CHALLENGES OF BIG DATA; ZAL AZMI
13. STRATEGIC CYBER INTELLIGENCE: AN EXAMINATION OF PRACTICES ACROSS
INDUSTRY, GOVERNMENT AND MILITARY; CONSTANCE UTHOFF
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Lemieux, Frédéric |
author_GND | (DE-588)1066715505 |
author_facet | Lemieux, Frédéric |
author_role | aut |
author_sort | Lemieux, Frédéric |
author_variant | f l fl |
building | Verbundindex |
bvnumber | BV042890914 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)934737131 (DE-599)BVBBV042890914 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
edition | First published |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03419nam a2200577 c 4500</leader><controlfield tag="001">BV042890914</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151123 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150925s2015 xxk |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">015013078</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781137455543</subfield><subfield code="9">978-1-137-45554-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)934737131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042890914</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lemieux, Frédéric</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1066715505</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Current and emerging trends in cyber operations</subfield><subfield code="b">policy, strategy and practice</subfield><subfield code="c">edited by Frederic Lemieux</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First published</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Basingstoke</subfield><subfield code="b">Palgrave Macmillan</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 254 pages</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Palgrave Macmillan's studies in cybercrime and cybersecurity</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cyber operations is an emerging professional and academic field of interest, encompassing multiple disciplines associated with both technical and non-technical operations conducted in cyber space. This book importantly focuses on the non-technical aspects, such as policy, strategy and best practice. It presents both theoretical and practical approaches towards understanding the evolution of cyber operations. This volume provides a multidisciplinary examination of international trends, with contributions from scholars and high-profile practitioners working in the fields of cyber security, cyber warfare, and information management. It also takes an international approach to these issues, incorporating studies from a military (warfare) context as well as civilian (private industry) environments. Current and Emerging Trends in Cyber Operations is essential reading for policy makers, military personnel, private sector professionals and both senior scholars and students to understand current changes and new issues in cyber operations"..</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / International Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / International Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE / Criminology</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028319415&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028319415</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV042890914 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:12:11Z |
institution | BVB |
isbn | 9781137455543 |
language | English |
lccn | 015013078 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028319415 |
oclc_num | 934737131 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XIII, 254 pages |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Palgrave Macmillan |
record_format | marc |
series2 | Palgrave Macmillan's studies in cybercrime and cybersecurity |
spelling | Lemieux, Frédéric Verfasser (DE-588)1066715505 aut Current and emerging trends in cyber operations policy, strategy and practice edited by Frederic Lemieux First published Basingstoke Palgrave Macmillan 2015 XIII, 254 pages txt rdacontent n rdamedia nc rdacarrier Palgrave Macmillan's studies in cybercrime and cybersecurity Includes bibliographical references and index "Cyber operations is an emerging professional and academic field of interest, encompassing multiple disciplines associated with both technical and non-technical operations conducted in cyber space. This book importantly focuses on the non-technical aspects, such as policy, strategy and best practice. It presents both theoretical and practical approaches towards understanding the evolution of cyber operations. This volume provides a multidisciplinary examination of international trends, with contributions from scholars and high-profile practitioners working in the fields of cyber security, cyber warfare, and information management. It also takes an international approach to these issues, incorporating studies from a military (warfare) context as well as civilian (private industry) environments. Current and Emerging Trends in Cyber Operations is essential reading for policy makers, military personnel, private sector professionals and both senior scholars and students to understand current changes and new issues in cyber operations".. COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh SOCIAL SCIENCE / Criminology bisacsh Cyberterrorism National security COMPUTERS / Security / General POLITICAL SCIENCE / Political Freedom & Security / International Security SOCIAL SCIENCE / Criminology Information warfare (DE-588)4461975-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s Bekämpfung (DE-588)4112701-8 s DE-604 LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028319415&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lemieux, Frédéric Current and emerging trends in cyber operations policy, strategy and practice COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh SOCIAL SCIENCE / Criminology bisacsh Cyberterrorism National security COMPUTERS / Security / General POLITICAL SCIENCE / Political Freedom & Security / International Security SOCIAL SCIENCE / Criminology Information warfare (DE-588)4461975-3 gnd Computersicherheit (DE-588)4274324-2 gnd Internetkriminalität (DE-588)7864395-8 gnd Bekämpfung (DE-588)4112701-8 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4274324-2 (DE-588)7864395-8 (DE-588)4112701-8 (DE-588)4143413-4 |
title | Current and emerging trends in cyber operations policy, strategy and practice |
title_auth | Current and emerging trends in cyber operations policy, strategy and practice |
title_exact_search | Current and emerging trends in cyber operations policy, strategy and practice |
title_full | Current and emerging trends in cyber operations policy, strategy and practice edited by Frederic Lemieux |
title_fullStr | Current and emerging trends in cyber operations policy, strategy and practice edited by Frederic Lemieux |
title_full_unstemmed | Current and emerging trends in cyber operations policy, strategy and practice edited by Frederic Lemieux |
title_short | Current and emerging trends in cyber operations |
title_sort | current and emerging trends in cyber operations policy strategy and practice |
title_sub | policy, strategy and practice |
topic | COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / International Security bisacsh SOCIAL SCIENCE / Criminology bisacsh Cyberterrorism National security COMPUTERS / Security / General POLITICAL SCIENCE / Political Freedom & Security / International Security SOCIAL SCIENCE / Criminology Information warfare (DE-588)4461975-3 gnd Computersicherheit (DE-588)4274324-2 gnd Internetkriminalität (DE-588)7864395-8 gnd Bekämpfung (DE-588)4112701-8 gnd |
topic_facet | COMPUTERS / Security / General POLITICAL SCIENCE / Political Freedom & Security / International Security SOCIAL SCIENCE / Criminology Cyberterrorism National security Information warfare Computersicherheit Internetkriminalität Bekämpfung Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028319415&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lemieuxfrederic currentandemergingtrendsincyberoperationspolicystrategyandpractice |