Introduction to cyber-warfare: a multidisciplinary approach
Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global mark...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam [Netherlands]
Morgan Kaufmann Publishers, an imprint of Elsevier
[2013]
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext Volltext |
Zusammenfassung: | Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xvii, 318 pages) |
ISBN: | 9780124079267 0124079261 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126104 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124079267 |9 978-0-12-407926-7 | ||
020 | |a 0124079261 |9 0-12-407926-1 | ||
035 | |a (ZDB-33-ESD)ocn846492852 | ||
035 | |a (OCoLC)846492852 | ||
035 | |a (DE-599)BVBBV046126104 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 355.4 |2 23 | |
100 | 1 | |a Shakarian, Paulo |e Verfasser |4 aut | |
245 | 1 | 0 | |a Introduction to cyber-warfare |b a multidisciplinary approach |c Paulo Shakarian, Jana Shakarian & Andrew Ruef |
264 | 1 | |a Amsterdam [Netherlands] |b Morgan Kaufmann Publishers, an imprint of Elsevier |c [2013] | |
300 | |a 1 online resource (xvii, 318 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent | ||
650 | 7 | |a HISTORY / Military / Strategy |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 4 | |a Information warfare |v Case studies | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Shakarian, Jana |e Sonstige |4 oth | |
700 | 1 | |a Ruef, Andrew |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0124078141 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124078147 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124078147 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 0 | |u http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780124078147 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506557 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124078147 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180445863084032 |
---|---|
any_adam_object | |
author | Shakarian, Paulo |
author_facet | Shakarian, Paulo |
author_role | aut |
author_sort | Shakarian, Paulo |
author_variant | p s ps |
building | Verbundindex |
bvnumber | BV046126104 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn846492852 (OCoLC)846492852 (DE-599)BVBBV046126104 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04085nmm a2200577zc 4500</leader><controlfield tag="001">BV046126104</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124079267</subfield><subfield code="9">978-0-12-407926-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124079261</subfield><subfield code="9">0-12-407926-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn846492852</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846492852</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shakarian, Paulo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to cyber-warfare</subfield><subfield code="b">a multidisciplinary approach</subfield><subfield code="c">Paulo Shakarian, Jana Shakarian & Andrew Ruef</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [Netherlands]</subfield><subfield code="b">Morgan Kaufmann Publishers, an imprint of Elsevier</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 318 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Military / Strategy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Jana</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruef, Andrew</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0124078141</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124078147</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124078147</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780124078147</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506557</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124078147</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV046126104 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:53Z |
institution | BVB |
isbn | 9780124079267 0124079261 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506557 |
oclc_num | 846492852 |
open_access_boolean | |
physical | 1 online resource (xvii, 318 pages) |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Morgan Kaufmann Publishers, an imprint of Elsevier |
record_format | marc |
spelling | Shakarian, Paulo Verfasser aut Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian, Jana Shakarian & Andrew Ruef Amsterdam [Netherlands] Morgan Kaufmann Publishers, an imprint of Elsevier [2013] 1 online resource (xvii, 318 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent HISTORY / Military / Strategy bisacsh Computer crimes fast Cyberterrorism fast Data protection fast Information warfare fast Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd rswk-swf (DE-588)4522595-3 Fallstudiensammlung gnd-content Information warfare (DE-588)4461975-3 s 1\p DE-604 Shakarian, Jana Sonstige oth Ruef, Andrew Sonstige oth Erscheint auch als Druck-Ausgabe 0124078141 Erscheint auch als Druck-Ausgabe 9780124078147 http://www.sciencedirect.com/science/book/9780124078147 Verlag URL des Erstveröffentlichers Volltext http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780124078147 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Shakarian, Paulo Introduction to cyber-warfare a multidisciplinary approach HISTORY / Military / Strategy bisacsh Computer crimes fast Cyberterrorism fast Data protection fast Information warfare fast Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4522595-3 |
title | Introduction to cyber-warfare a multidisciplinary approach |
title_auth | Introduction to cyber-warfare a multidisciplinary approach |
title_exact_search | Introduction to cyber-warfare a multidisciplinary approach |
title_full | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian, Jana Shakarian & Andrew Ruef |
title_fullStr | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian, Jana Shakarian & Andrew Ruef |
title_full_unstemmed | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian, Jana Shakarian & Andrew Ruef |
title_short | Introduction to cyber-warfare |
title_sort | introduction to cyber warfare a multidisciplinary approach |
title_sub | a multidisciplinary approach |
topic | HISTORY / Military / Strategy bisacsh Computer crimes fast Cyberterrorism fast Data protection fast Information warfare fast Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd |
topic_facet | HISTORY / Military / Strategy Computer crimes Cyberterrorism Data protection Information warfare Information warfare Case studies Cyberspace Security measures Fallstudiensammlung |
url | http://www.sciencedirect.com/science/book/9780124078147 http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780124078147 |
work_keys_str_mv | AT shakarianpaulo introductiontocyberwarfareamultidisciplinaryapproach AT shakarianjana introductiontocyberwarfareamultidisciplinaryapproach AT ruefandrew introductiontocyberwarfareamultidisciplinaryapproach |