Cyberwarfare: information operations in a connected world
"Cyberwarfare : information operations in a connected world reviews the role that cyberwarfare plays in modern military operations ... operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the vari...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Jones & Bartlett Learning
[2015]
|
Schriftenreihe: | Information systems security & assurance series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "Cyberwarfare : information operations in a connected world reviews the role that cyberwarfare plays in modern military operations ... operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered...from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare; its interaction with military doctrine; and the Pandora's box opened by recent events, which have set the stage for future cyber attacks."...Page [4] of cover |
Beschreibung: | Includes bibliographical references (pages 399-413) and index |
Beschreibung: | xix, 428 pages illustrations 24 cm |
ISBN: | 1284058484 9781284058482 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044697180 | ||
003 | DE-604 | ||
005 | 20180130 | ||
007 | t | ||
008 | 180102s2015 xxua||| |||| 00||| eng d | ||
010 | |a 015451195 | ||
020 | |a 1284058484 |9 1-284-05848-4 | ||
020 | |a 9781284058482 |c Pb.: £ 41.99 |9 978-1-284-05848-2 | ||
035 | |a (OCoLC)1021100284 | ||
035 | |a (DE-599)BVBBV044697180 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Chapple, Mike |d 1975- |e Verfasser |0 (DE-588)108422027X |4 aut | |
245 | 1 | 0 | |a Cyberwarfare |b information operations in a connected world |c Mike Chapple and David Seidl |
264 | 1 | |a Burlington, MA |b Jones & Bartlett Learning |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a xix, 428 pages |b illustrations |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information systems security & assurance series | |
500 | |a Includes bibliographical references (pages 399-413) and index | ||
520 | |a "Cyberwarfare : information operations in a connected world reviews the role that cyberwarfare plays in modern military operations ... operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered...from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare; its interaction with military doctrine; and the Pandora's box opened by recent events, which have set the stage for future cyber attacks."...Page [4] of cover | ||
650 | 4 | |a Computer crimes / fast / (OCoLC)fst00872063 | |
650 | 4 | |a Cyber intelligence (Computer security) / fast / (OCoLC)fst01893401 | |
650 | 4 | |a Computercriminaliteit / gtt / (NL-LeOCL)095969853 | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Computercriminaliteit | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Kampfführung |0 (DE-588)4129475-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 3 | |a Elektronische Kampfführung |0 (DE-588)4129475-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Seidl, David |e Verfasser |4 aut | |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030093991&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030093991 |
Datensatz im Suchindex
_version_ | 1804178164052656128 |
---|---|
adam_text | CYBERWARFARE
/ CHAPPLE, MIKEYYD1975-
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PART I: THE CYBERWARFARE LANDSCAPE
CHAPTER 1: INFORMATION AS A MILITARY ASSET CHAPTER
2: TARGETS AND COMBATANTS
CHAPTER 3: CYBERWARFARE, LAW, AND ETHICS
CHAPTER 4: INTELLIGENCE OPERATIONS IN A CONNECTED WORLD
PART II: OFFENSIVE AND DEFENSIVE CYBERWARFARE
CHAPTER 5: THE EVOLVING THREAT: FROM SCRIPT KIDDIES TO ADVANCED
ATTACKERS
CHAPTER 6: SOCIAL ENGINEERING AND CYBERWARFARE
CHAPTER 7: WEAPONIZING CYBERSPACE: A HISTORY
CHAPTER 8: NONSTATE ACTORS IN CYBERWAR
CHAPTER 9: DEFENSE-IN-DEPTH STRATEGIES
CHAPTER 10: CRYPTOGRAPHY AND CYBERWAR
CHAPTER 11: DEFENDING ENDPOINTS
CHAPTER 12: DEFENDING NETWORKS
CHAPTER 13: DEFENDING DATA
PART III: THE FUTURE OF CYBERWARFARE
CHAPTER 14: CYBERWARFARE AND MILITARY DOCTRINE
CHAPTER 15: PANDORA S BOX: THE FUTURE OF CYBERWARFARE
DIESES SCHRIFTSTCK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Chapple, Mike 1975- Seidl, David |
author_GND | (DE-588)108422027X |
author_facet | Chapple, Mike 1975- Seidl, David |
author_role | aut aut |
author_sort | Chapple, Mike 1975- |
author_variant | m c mc d s ds |
building | Verbundindex |
bvnumber | BV044697180 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
ctrlnum | (OCoLC)1021100284 (DE-599)BVBBV044697180 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03555nam a2200589 c 4500</leader><controlfield tag="001">BV044697180</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180130 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180102s2015 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">015451195</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1284058484</subfield><subfield code="9">1-284-05848-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781284058482</subfield><subfield code="c">Pb.: £ 41.99</subfield><subfield code="9">978-1-284-05848-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1021100284</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044697180</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chapple, Mike</subfield><subfield code="d">1975-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)108422027X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberwarfare</subfield><subfield code="b">information operations in a connected world</subfield><subfield code="c">Mike Chapple and David Seidl</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Jones & Bartlett Learning</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xix, 428 pages</subfield><subfield code="b">illustrations</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information systems security & assurance series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 399-413) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cyberwarfare : information operations in a connected world reviews the role that cyberwarfare plays in modern military operations ... operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered...from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare; its interaction with military doctrine; and the Pandora's box opened by recent events, which have set the stage for future cyber attacks."...Page [4] of cover</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / fast / (OCoLC)fst00872063</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security) / fast / (OCoLC)fst01893401</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computercriminaliteit / gtt / (NL-LeOCL)095969853</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computercriminaliteit</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Kampfführung</subfield><subfield code="0">(DE-588)4129475-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Elektronische Kampfführung</subfield><subfield code="0">(DE-588)4129475-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seidl, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030093991&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030093991</subfield></datafield></record></collection> |
id | DE-604.BV044697180 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:59:37Z |
institution | BVB |
isbn | 1284058484 9781284058482 |
language | English |
lccn | 015451195 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030093991 |
oclc_num | 1021100284 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | xix, 428 pages illustrations 24 cm |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Jones & Bartlett Learning |
record_format | marc |
series2 | Information systems security & assurance series |
spelling | Chapple, Mike 1975- Verfasser (DE-588)108422027X aut Cyberwarfare information operations in a connected world Mike Chapple and David Seidl Burlington, MA Jones & Bartlett Learning [2015] © 2015 xix, 428 pages illustrations 24 cm txt rdacontent n rdamedia nc rdacarrier Information systems security & assurance series Includes bibliographical references (pages 399-413) and index "Cyberwarfare : information operations in a connected world reviews the role that cyberwarfare plays in modern military operations ... operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered...from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare; its interaction with military doctrine; and the Pandora's box opened by recent events, which have set the stage for future cyber attacks."...Page [4] of cover Computer crimes / fast / (OCoLC)fst00872063 Cyber intelligence (Computer security) / fast / (OCoLC)fst01893401 Computercriminaliteit / gtt / (NL-LeOCL)095969853 Cyber intelligence (Computer security) Computer crimes Computercriminaliteit Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Elektronische Kampfführung (DE-588)4129475-0 gnd rswk-swf Information warfare (DE-588)4461975-3 s Computersicherheit (DE-588)4274324-2 s Internetkriminalität (DE-588)7864395-8 s Elektronische Kampfführung (DE-588)4129475-0 s DE-604 Seidl, David Verfasser aut LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030093991&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Chapple, Mike 1975- Seidl, David Cyberwarfare information operations in a connected world Computer crimes / fast / (OCoLC)fst00872063 Cyber intelligence (Computer security) / fast / (OCoLC)fst01893401 Computercriminaliteit / gtt / (NL-LeOCL)095969853 Cyber intelligence (Computer security) Computer crimes Computercriminaliteit Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd Elektronische Kampfführung (DE-588)4129475-0 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)4274324-2 (DE-588)4461975-3 (DE-588)4129475-0 |
title | Cyberwarfare information operations in a connected world |
title_auth | Cyberwarfare information operations in a connected world |
title_exact_search | Cyberwarfare information operations in a connected world |
title_full | Cyberwarfare information operations in a connected world Mike Chapple and David Seidl |
title_fullStr | Cyberwarfare information operations in a connected world Mike Chapple and David Seidl |
title_full_unstemmed | Cyberwarfare information operations in a connected world Mike Chapple and David Seidl |
title_short | Cyberwarfare |
title_sort | cyberwarfare information operations in a connected world |
title_sub | information operations in a connected world |
topic | Computer crimes / fast / (OCoLC)fst00872063 Cyber intelligence (Computer security) / fast / (OCoLC)fst01893401 Computercriminaliteit / gtt / (NL-LeOCL)095969853 Cyber intelligence (Computer security) Computer crimes Computercriminaliteit Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd Information warfare (DE-588)4461975-3 gnd Elektronische Kampfführung (DE-588)4129475-0 gnd |
topic_facet | Computer crimes / fast / (OCoLC)fst00872063 Cyber intelligence (Computer security) / fast / (OCoLC)fst01893401 Computercriminaliteit / gtt / (NL-LeOCL)095969853 Cyber intelligence (Computer security) Computer crimes Computercriminaliteit Internetkriminalität Computersicherheit Information warfare Elektronische Kampfführung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030093991&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT chapplemike cyberwarfareinformationoperationsinaconnectedworld AT seidldavid cyberwarfareinformationoperationsinaconnectedworld |