Conflict and cooperation in cyberspace: the challenge to national security
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
Taylor & Francis
[2014]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxviii, 332 Seiten 24 cm |
ISBN: | 9781466592018 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046324558 | ||
003 | DE-604 | ||
005 | 20200207 | ||
007 | t | ||
008 | 200109s2014 xxu |||| 00||| eng d | ||
010 | |a 013020070 | ||
020 | |a 9781466592018 |9 978-1-4665-9201-8 | ||
035 | |a (OCoLC)859533460 | ||
035 | |a (DE-599)BVBBV046324558 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-473 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 355.4/1 |2 23 | |
084 | |a MG 70950 |0 (DE-625)122860:12227 |2 rvk | ||
245 | 1 | 0 | |a Conflict and cooperation in cyberspace |b the challenge to national security |c edited by Panayotis A. Yannakogeorgos, Adam B. Lowther |
264 | 1 | |a Boca Raton ; London ; New York |b Taylor & Francis |c [2014] | |
300 | |a xxviii, 332 Seiten |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Information warfare |x Prevention | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Cyberspace |x Security measures |x Government policy |z United States | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a National security |z United States | |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 2 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 3 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 4 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yannakogeorgos, Panayotis A. |0 (DE-588)104160596X |4 edt | |
700 | 1 | |a Lowther, Adam B. |d 1975- |0 (DE-588)137165862 |4 edt | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031701512&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-031701512 |
Datensatz im Suchindex
_version_ | 1804180809874145280 |
---|---|
adam_text | Contents Foreword ix Acknowledgments xiii Introduction xv Editors хху Contributors Part I xxvii Key Considerations Chapter 1 3 The Future of Things Cyber MICHAEL V. HAYDEN Chapter 2 Taming the “21st Century’s Wild West” of Cyberspace? 9 LYNN MATTICE Chapter 3 Cyberspace Superiority Considerations 13 FRED TAYLOR, JR· AND JERRY CARTER Chapter 4 Two, Maybe Three Cheers Ambiguity 27 The Essential Features of an Ontology for Cyberwarfare 35 for MARTIN C. LIBICKI Chapter 5 RANDALL R. DIPERT V
VI CONTENTS Chapter 3 The Prospects for Cyber Deterrence: American Sponsorship of Global Norms 49 PANAYOTIS A. YANNAKOGEORGOS AND ADAM B. LOWTHER Part II Technology Chapter 7 Challenges in Monitoring Cyberarms Compliance 81 NEIL C. ROWE, SIMSON L. GARFINKEL, ROBERT BEVERLY, AND PANAYOTIS A. YANNAKOGEORGOS Chapter 8 Digital Policy Managementia Foundation for Tomorrow 101 NATIONAL SECURITY AGENCY (NSA), ENTERPRISE SERVICES DIVISION, IDENTITY AND ACCESS MANAGEMENT BRANCH Chapter 9 On Mission Assurance 107 KAMAL JABBOUR AND SARAH MUCCIO Chapter 10 Stuxnet: A Case Study in Cyber Warfare 127 ERIC P. OLIVER Chapter 11 The Internet and Dissent in Authoritarian States 161 JAMES D. FIELDER Part II I Ethics, Law, and Policy Chapter 12 Can There Be an Ethical Cyber War? 195 GEORGE R. LUCAS, JR. Chapter 13 Perspectives for Cyberstrategists on Cyberlaw for Cyberwar 211 CHARLES J. DUNLAP, JR. Chapter 14 A New Normal? The Cultivation of Global Norms as Part of a Cybersecurity Strategy ROGER HURWITZ 233
CONTENTS Chapter 1 5 Cyberdefense as Environmental Protection—The Broader Potential Impact of Failed Defensive Counter Cyber Operations VII 265 JAN KALLBERG AND ROSEMARY A. BURK Chapter 1 6 Cyber Sovereignty 277 STEPHEN K. GOURLEY Chapter 1 7 American Cybersecurity Triad: Governmentwide Integration, Technological Counterintelligence, and Educational Mobilization 291 SUNGHYUN KIM Index 311
|
any_adam_object | 1 |
author2 | Yannakogeorgos, Panayotis A. Lowther, Adam B. 1975- |
author2_role | edt edt |
author2_variant | p a y pa pay a b l ab abl |
author_GND | (DE-588)104160596X (DE-588)137165862 |
author_facet | Yannakogeorgos, Panayotis A. Lowther, Adam B. 1975- |
building | Verbundindex |
bvnumber | BV046324558 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
classification_rvk | MG 70950 |
ctrlnum | (OCoLC)859533460 (DE-599)BVBBV046324558 |
dewey-full | 355.4/1 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4/1 |
dewey-search | 355.4/1 |
dewey-sort | 3355.4 11 |
dewey-tens | 350 - Public administration and military science |
discipline | Politologie Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02321nam a2200553 c 4500</leader><controlfield tag="001">BV046324558</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200207 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200109s2014 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">013020070</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466592018</subfield><subfield code="9">978-1-4665-9201-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859533460</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046324558</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.4/1</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MG 70950</subfield><subfield code="0">(DE-625)122860:12227</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Conflict and cooperation in cyberspace</subfield><subfield code="b">the challenge to national security</subfield><subfield code="c">edited by Panayotis A. Yannakogeorgos, Adam B. Lowther</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">Taylor & Francis</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxviii, 332 Seiten</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yannakogeorgos, Panayotis A.</subfield><subfield code="0">(DE-588)104160596X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowther, Adam B.</subfield><subfield code="d">1975-</subfield><subfield code="0">(DE-588)137165862</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031701512&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031701512</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV046324558 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:41:40Z |
institution | BVB |
isbn | 9781466592018 |
language | English |
lccn | 013020070 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031701512 |
oclc_num | 859533460 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | xxviii, 332 Seiten 24 cm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Taylor & Francis |
record_format | marc |
spelling | Conflict and cooperation in cyberspace the challenge to national security edited by Panayotis A. Yannakogeorgos, Adam B. Lowther Boca Raton ; London ; New York Taylor & Francis [2014] xxviii, 332 Seiten 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Information warfare Prevention Cyberspace Security measures Cyberspace Security measures Government policy United States Cyberterrorism Prevention National security United States Terrorismus (DE-588)4059534-1 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content USA (DE-588)4078704-7 g Cyberspace (DE-588)4266146-8 s Sicherheitspolitik (DE-588)4116489-1 s Terrorismus (DE-588)4059534-1 s Information warfare (DE-588)4461975-3 s DE-604 Yannakogeorgos, Panayotis A. (DE-588)104160596X edt Lowther, Adam B. 1975- (DE-588)137165862 edt Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031701512&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Conflict and cooperation in cyberspace the challenge to national security Information warfare Prevention Cyberspace Security measures Cyberspace Security measures Government policy United States Cyberterrorism Prevention National security United States Terrorismus (DE-588)4059534-1 gnd Information warfare (DE-588)4461975-3 gnd Cyberspace (DE-588)4266146-8 gnd Sicherheitspolitik (DE-588)4116489-1 gnd |
subject_GND | (DE-588)4059534-1 (DE-588)4461975-3 (DE-588)4266146-8 (DE-588)4116489-1 (DE-588)4078704-7 (DE-588)4143413-4 |
title | Conflict and cooperation in cyberspace the challenge to national security |
title_auth | Conflict and cooperation in cyberspace the challenge to national security |
title_exact_search | Conflict and cooperation in cyberspace the challenge to national security |
title_full | Conflict and cooperation in cyberspace the challenge to national security edited by Panayotis A. Yannakogeorgos, Adam B. Lowther |
title_fullStr | Conflict and cooperation in cyberspace the challenge to national security edited by Panayotis A. Yannakogeorgos, Adam B. Lowther |
title_full_unstemmed | Conflict and cooperation in cyberspace the challenge to national security edited by Panayotis A. Yannakogeorgos, Adam B. Lowther |
title_short | Conflict and cooperation in cyberspace |
title_sort | conflict and cooperation in cyberspace the challenge to national security |
title_sub | the challenge to national security |
topic | Information warfare Prevention Cyberspace Security measures Cyberspace Security measures Government policy United States Cyberterrorism Prevention National security United States Terrorismus (DE-588)4059534-1 gnd Information warfare (DE-588)4461975-3 gnd Cyberspace (DE-588)4266146-8 gnd Sicherheitspolitik (DE-588)4116489-1 gnd |
topic_facet | Information warfare Prevention Cyberspace Security measures Cyberspace Security measures Government policy United States Cyberterrorism Prevention National security United States Terrorismus Information warfare Cyberspace Sicherheitspolitik USA Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031701512&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT yannakogeorgospanayotisa conflictandcooperationincyberspacethechallengetonationalsecurity AT lowtheradamb conflictandcooperationincyberspacethechallengetonationalsecurity |