The virtual battlefield: perspectives on cyber warfare
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam
Ios Press
©2009
|
Schriftenreihe: | Cryptology and information security series
v. 3 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and indexes pt. 1. Strategic viewpoints. Cyber wars : a paradigm shift from means to ends / Amit Sharma -- Towards an evolving theory of cyberpower / Stuart H. Starr -- Sub rosa cyber war / Martin C. Libicki -- Warfare and the continuum of cyber risks : a policy perspective / Andrew Cutts -- Cyber terrorism : a new dimension in battlespace / J.P.I.A.G Charvat -- Borders in cyberspace : can sovereignty adapt to the challenges of cyber security? / Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. Rios -- Belarus in the context of European cyber security / Fyodor Pavlyuchenko -- Politically motivated denial of service attacks / Jose Nazario -- A brief examination of media coverage of cyberattacks (2007-present) / Cyrus Farivar pt. 2. Technical challenges and solutions. Behavioral analysis of zombie armies / Olivier Thonnard, Wim Mees, Marc Dacier -- Proactive botnet countermeasures-an offensive approach / Felix Leder, Tillmann Werner, Peter Martini -- When not to pull the plug-the need for network counter-surveillance operations / Scott Knight, Sylvain Leblanc -- Autonomic computer network defence using risk state and reinforcement learning / Luc Beaudoin, Nathalie Japkowicz, Stan Matwin -- Enhancing graph-based automated DoS attack response / Gabriel Klein [and others] -- On nth order attacks / Daniel Bilar -- Business and social evaluation of denial of service attacks in view of scaling economic counter-measures / Louis-Francois Pau -- Virtual plots, real revolution / Roelof Temmingh, Kenneth Geers "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - and highlights the growing connection between computer security and national security"--Jacket |
Beschreibung: | 1 Online-Ressource (xx, 305 pages) |
ISBN: | 1607505118 9781607505112 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043116447 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 1607505118 |9 1-60750-511-8 | ||
020 | |a 9781607505112 |9 978-1-60750-511-2 | ||
035 | |a (OCoLC)591152271 | ||
035 | |a (DE-599)BVBBV043116447 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 355.4 |2 22 | |
245 | 1 | 0 | |a The virtual battlefield |b perspectives on cyber warfare |c edited by Christian Czosseck and Kenneth Geers |
264 | 1 | |a Amsterdam |b Ios Press |c ©2009 | |
300 | |a 1 Online-Ressource (xx, 305 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Cryptology and information security series |v v. 3 | |
500 | |a Includes bibliographical references and indexes | ||
500 | |a pt. 1. Strategic viewpoints. Cyber wars : a paradigm shift from means to ends / Amit Sharma -- Towards an evolving theory of cyberpower / Stuart H. Starr -- Sub rosa cyber war / Martin C. Libicki -- Warfare and the continuum of cyber risks : a policy perspective / Andrew Cutts -- Cyber terrorism : a new dimension in battlespace / J.P.I.A.G Charvat -- Borders in cyberspace : can sovereignty adapt to the challenges of cyber security? / Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. Rios -- Belarus in the context of European cyber security / Fyodor Pavlyuchenko -- Politically motivated denial of service attacks / Jose Nazario -- A brief examination of media coverage of cyberattacks (2007-present) / Cyrus Farivar | ||
500 | |a pt. 2. Technical challenges and solutions. Behavioral analysis of zombie armies / Olivier Thonnard, Wim Mees, Marc Dacier -- Proactive botnet countermeasures-an offensive approach / Felix Leder, Tillmann Werner, Peter Martini -- When not to pull the plug-the need for network counter-surveillance operations / Scott Knight, Sylvain Leblanc -- Autonomic computer network defence using risk state and reinforcement learning / Luc Beaudoin, Nathalie Japkowicz, Stan Matwin -- Enhancing graph-based automated DoS attack response / Gabriel Klein [and others] -- On nth order attacks / Daniel Bilar -- Business and social evaluation of denial of service attacks in view of scaling economic counter-measures / Louis-Francois Pau -- Virtual plots, real revolution / Roelof Temmingh, Kenneth Geers | ||
500 | |a "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - and highlights the growing connection between computer security and national security"--Jacket | ||
650 | 7 | |a HISTORY / Military / Strategy |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 4 | |a Information warfare | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Czosseck, Christian |e Sonstige |4 oth | |
700 | 1 | |a Geers, Kenneth |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 1-60750-060-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-60750-060-5 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315819 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028540638 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315819 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315819 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175541582954496 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043116447 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)591152271 (DE-599)BVBBV043116447 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04980nmm a2200577zcb4500</leader><controlfield tag="001">BV043116447</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607505118</subfield><subfield code="9">1-60750-511-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607505112</subfield><subfield code="9">978-1-60750-511-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)591152271</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043116447</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The virtual battlefield</subfield><subfield code="b">perspectives on cyber warfare</subfield><subfield code="c">edited by Christian Czosseck and Kenneth Geers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Ios Press</subfield><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 305 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v. 3</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">pt. 1. Strategic viewpoints. Cyber wars : a paradigm shift from means to ends / Amit Sharma -- Towards an evolving theory of cyberpower / Stuart H. Starr -- Sub rosa cyber war / Martin C. Libicki -- Warfare and the continuum of cyber risks : a policy perspective / Andrew Cutts -- Cyber terrorism : a new dimension in battlespace / J.P.I.A.G Charvat -- Borders in cyberspace : can sovereignty adapt to the challenges of cyber security? / Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. Rios -- Belarus in the context of European cyber security / Fyodor Pavlyuchenko -- Politically motivated denial of service attacks / Jose Nazario -- A brief examination of media coverage of cyberattacks (2007-present) / Cyrus Farivar</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">pt. 2. Technical challenges and solutions. Behavioral analysis of zombie armies / Olivier Thonnard, Wim Mees, Marc Dacier -- Proactive botnet countermeasures-an offensive approach / Felix Leder, Tillmann Werner, Peter Martini -- When not to pull the plug-the need for network counter-surveillance operations / Scott Knight, Sylvain Leblanc -- Autonomic computer network defence using risk state and reinforcement learning / Luc Beaudoin, Nathalie Japkowicz, Stan Matwin -- Enhancing graph-based automated DoS attack response / Gabriel Klein [and others] -- On nth order attacks / Daniel Bilar -- Business and social evaluation of denial of service attacks in view of scaling economic counter-measures / Louis-Francois Pau -- Virtual plots, real revolution / Roelof Temmingh, Kenneth Geers</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - and highlights the growing connection between computer security and national security"--Jacket</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Military / Strategy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Czosseck, Christian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Geers, Kenneth</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">1-60750-060-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-60750-060-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315819</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028540638</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315819</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315819</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043116447 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:56Z |
institution | BVB |
isbn | 1607505118 9781607505112 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028540638 |
oclc_num | 591152271 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xx, 305 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Ios Press |
record_format | marc |
series2 | Cryptology and information security series |
spelling | The virtual battlefield perspectives on cyber warfare edited by Christian Czosseck and Kenneth Geers Amsterdam Ios Press ©2009 1 Online-Ressource (xx, 305 pages) txt rdacontent c rdamedia cr rdacarrier Cryptology and information security series v. 3 Includes bibliographical references and indexes pt. 1. Strategic viewpoints. Cyber wars : a paradigm shift from means to ends / Amit Sharma -- Towards an evolving theory of cyberpower / Stuart H. Starr -- Sub rosa cyber war / Martin C. Libicki -- Warfare and the continuum of cyber risks : a policy perspective / Andrew Cutts -- Cyber terrorism : a new dimension in battlespace / J.P.I.A.G Charvat -- Borders in cyberspace : can sovereignty adapt to the challenges of cyber security? / Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. Rios -- Belarus in the context of European cyber security / Fyodor Pavlyuchenko -- Politically motivated denial of service attacks / Jose Nazario -- A brief examination of media coverage of cyberattacks (2007-present) / Cyrus Farivar pt. 2. Technical challenges and solutions. Behavioral analysis of zombie armies / Olivier Thonnard, Wim Mees, Marc Dacier -- Proactive botnet countermeasures-an offensive approach / Felix Leder, Tillmann Werner, Peter Martini -- When not to pull the plug-the need for network counter-surveillance operations / Scott Knight, Sylvain Leblanc -- Autonomic computer network defence using risk state and reinforcement learning / Luc Beaudoin, Nathalie Japkowicz, Stan Matwin -- Enhancing graph-based automated DoS attack response / Gabriel Klein [and others] -- On nth order attacks / Daniel Bilar -- Business and social evaluation of denial of service attacks in view of scaling economic counter-measures / Louis-Francois Pau -- Virtual plots, real revolution / Roelof Temmingh, Kenneth Geers "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - and highlights the growing connection between computer security and national security"--Jacket HISTORY / Military / Strategy bisacsh Computer crimes fast Cyberterrorism fast Information warfare fast Information warfare Cyberterrorism Computer crimes Information warfare (DE-588)4461975-3 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s 2\p DE-604 Czosseck, Christian Sonstige oth Geers, Kenneth Sonstige oth Erscheint auch als Druck-Ausgabe, Hardcover 1-60750-060-4 Erscheint auch als Druck-Ausgabe, Hardcover 978-1-60750-060-5 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315819 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | The virtual battlefield perspectives on cyber warfare HISTORY / Military / Strategy bisacsh Computer crimes fast Cyberterrorism fast Information warfare fast Information warfare Cyberterrorism Computer crimes Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4143413-4 |
title | The virtual battlefield perspectives on cyber warfare |
title_auth | The virtual battlefield perspectives on cyber warfare |
title_exact_search | The virtual battlefield perspectives on cyber warfare |
title_full | The virtual battlefield perspectives on cyber warfare edited by Christian Czosseck and Kenneth Geers |
title_fullStr | The virtual battlefield perspectives on cyber warfare edited by Christian Czosseck and Kenneth Geers |
title_full_unstemmed | The virtual battlefield perspectives on cyber warfare edited by Christian Czosseck and Kenneth Geers |
title_short | The virtual battlefield |
title_sort | the virtual battlefield perspectives on cyber warfare |
title_sub | perspectives on cyber warfare |
topic | HISTORY / Military / Strategy bisacsh Computer crimes fast Cyberterrorism fast Information warfare fast Information warfare Cyberterrorism Computer crimes Information warfare (DE-588)4461975-3 gnd |
topic_facet | HISTORY / Military / Strategy Computer crimes Cyberterrorism Information warfare Aufsatzsammlung |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315819 |
work_keys_str_mv | AT czosseckchristian thevirtualbattlefieldperspectivesoncyberwarfare AT geerskenneth thevirtualbattlefieldperspectivesoncyberwarfare |