The hacker and the state: cyber attacks and the new normal of geopolitics
The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global cont...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, Massachusetts ; London, England
Harvard University Press
[2020]
|
Schlagworte: | |
Online-Zugang: | FAB01 FAW01 FCO01 FHA01 FKE01 FLA01 TUM01 UBG01 UPA01 Volltext |
Zusammenfassung: | The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global contest for geopolitical advantage |
Beschreibung: | 1 Online-Ressource (412 Seiten) |
ISBN: | 9780674246010 9780674245983 9780674245990 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046761000 | ||
003 | DE-604 | ||
005 | 20240220 | ||
007 | cr|uuu---uuuuu | ||
008 | 200615s2020 |||| o||u| ||||||eng d | ||
020 | |a 9780674246010 |q PDF |9 978-0-674-24601-0 | ||
020 | |a 9780674245983 |q EPUB |9 978-0-674-24598-3 | ||
020 | |a 9780674245990 |q MOBI |9 978-0-674-24599-0 | ||
024 | 7 | |a 10.4159/9780674246010 |2 doi | |
035 | |a (ZDB-23-DGG)9780674246010 | ||
035 | |a (OCoLC)1164653601 | ||
035 | |a (DE-599)BVBBV046761000 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-Aug4 |a DE-859 |a DE-860 |a DE-473 |a DE-739 |a DE-1043 |a DE-858 |a DE-91 | ||
082 | 0 | |a 005.8/7 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 461 |2 stub | ||
084 | |a DAT 055 |2 stub | ||
100 | 1 | |a Buchanan, Ben |e Verfasser |0 (DE-588)1126122939 |4 aut | |
245 | 1 | 0 | |a The hacker and the state |b cyber attacks and the new normal of geopolitics |c Ben Buchanan |
264 | 1 | |a Cambridge, Massachusetts ; London, England |b Harvard University Press |c [2020] | |
264 | 4 | |c © 2020 | |
300 | |a 1 Online-Ressource (412 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global contest for geopolitical advantage | ||
650 | 7 | |a POLITICAL SCIENCE / Intelligence & Espionage |2 bisacsh | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Cyberspace operations (Military science) | |
650 | 4 | |a Cyberspace |x Political aspects | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Hacking |x Political aspects | |
650 | 0 | 7 | |a Cyberterrorismus |0 (DE-588)1118882725 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geopolitik |0 (DE-588)4156741-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Cyberterrorismus |0 (DE-588)1118882725 |D s |
689 | 0 | 3 | |a Geopolitik |0 (DE-588)4156741-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-674-98755-5 |
856 | 4 | 0 | |u https://www.degruyter.com/isbn/9780674246010 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032170536 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://www.degruyter.com/isbn/9780674246010 |l FAB01 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://www.degruyter.com/isbn/9780674246010 |l FAW01 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://www.degruyter.com/isbn/9780674246010 |l FCO01 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://www.degruyter.com/isbn/9780674246010 |l FHA01 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://www.degruyter.com/isbn/9780674246010 |l FKE01 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://www.degruyter.com/isbn/9780674246010 |l FLA01 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6119381 |l TUM01 |p ZDB-30-PQE |q TUM_PDA_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://www.degruyter.com/isbn/9780674246010 |l UBG01 |p ZDB-23-DGG |q UBG_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://www.degruyter.com/isbn/9780674246010 |l UPA01 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181526950182912 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Buchanan, Ben |
author_GND | (DE-588)1126122939 |
author_facet | Buchanan, Ben |
author_role | aut |
author_sort | Buchanan, Ben |
author_variant | b b bb |
building | Verbundindex |
bvnumber | BV046761000 |
classification_rvk | ST 277 |
classification_tum | DAT 461 DAT 055 |
collection | ZDB-23-DGG ZDB-30-PQE |
ctrlnum | (ZDB-23-DGG)9780674246010 (OCoLC)1164653601 (DE-599)BVBBV046761000 |
dewey-full | 005.8/7 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/7 |
dewey-search | 005.8/7 |
dewey-sort | 15.8 17 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03761nmm a2200709zc 4500</leader><controlfield tag="001">BV046761000</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240220 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200615s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674246010</subfield><subfield code="q">PDF</subfield><subfield code="9">978-0-674-24601-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674245983</subfield><subfield code="q">EPUB</subfield><subfield code="9">978-0-674-24598-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674245990</subfield><subfield code="q">MOBI</subfield><subfield code="9">978-0-674-24599-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/9780674246010</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9780674246010</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1164653601</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046761000</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchanan, Ben</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1126122939</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The hacker and the state</subfield><subfield code="b">cyber attacks and the new normal of geopolitics</subfield><subfield code="c">Ben Buchanan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Massachusetts ; London, England</subfield><subfield code="b">Harvard University Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (412 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global contest for geopolitical advantage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Intelligence & Espionage</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geopolitik</subfield><subfield code="0">(DE-588)4156741-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Geopolitik</subfield><subfield code="0">(DE-588)4156741-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-674-98755-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032170536</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6119381</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_PDA_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UBG_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046761000 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:44:35Z |
indexdate | 2024-07-10T08:53:04Z |
institution | BVB |
isbn | 9780674246010 9780674245983 9780674245990 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032170536 |
oclc_num | 1164653601 |
open_access_boolean | |
owner | DE-1046 DE-Aug4 DE-859 DE-860 DE-473 DE-BY-UBG DE-739 DE-1043 DE-858 DE-91 DE-BY-TUM |
owner_facet | DE-1046 DE-Aug4 DE-859 DE-860 DE-473 DE-BY-UBG DE-739 DE-1043 DE-858 DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (412 Seiten) |
psigel | ZDB-23-DGG ZDB-30-PQE ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-30-PQE TUM_PDA_PQE_Kauf ZDB-23-DGG UBG_PDA_DGG ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Harvard University Press |
record_format | marc |
spelling | Buchanan, Ben Verfasser (DE-588)1126122939 aut The hacker and the state cyber attacks and the new normal of geopolitics Ben Buchanan Cambridge, Massachusetts ; London, England Harvard University Press [2020] © 2020 1 Online-Ressource (412 Seiten) txt rdacontent c rdamedia cr rdacarrier The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global contest for geopolitical advantage POLITICAL SCIENCE / Intelligence & Espionage bisacsh Cyber intelligence (Computer security) Cyberspace operations (Military science) Cyberspace Political aspects Cyberterrorism Hacking Political aspects Cyberterrorismus (DE-588)1118882725 gnd rswk-swf Geopolitik (DE-588)4156741-9 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Cyberattacke (DE-588)1075612675 gnd rswk-swf Cyberattacke (DE-588)1075612675 s Information warfare (DE-588)4461975-3 s Cyberterrorismus (DE-588)1118882725 s Geopolitik (DE-588)4156741-9 s 1\p DE-604 Erscheint auch als Druck-Ausgabe 978-0-674-98755-5 https://www.degruyter.com/isbn/9780674246010 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Buchanan, Ben The hacker and the state cyber attacks and the new normal of geopolitics POLITICAL SCIENCE / Intelligence & Espionage bisacsh Cyber intelligence (Computer security) Cyberspace operations (Military science) Cyberspace Political aspects Cyberterrorism Hacking Political aspects Cyberterrorismus (DE-588)1118882725 gnd Geopolitik (DE-588)4156741-9 gnd Information warfare (DE-588)4461975-3 gnd Cyberattacke (DE-588)1075612675 gnd |
subject_GND | (DE-588)1118882725 (DE-588)4156741-9 (DE-588)4461975-3 (DE-588)1075612675 |
title | The hacker and the state cyber attacks and the new normal of geopolitics |
title_auth | The hacker and the state cyber attacks and the new normal of geopolitics |
title_exact_search | The hacker and the state cyber attacks and the new normal of geopolitics |
title_exact_search_txtP | The hacker and the state cyber attacks and the new normal of geopolitics |
title_full | The hacker and the state cyber attacks and the new normal of geopolitics Ben Buchanan |
title_fullStr | The hacker and the state cyber attacks and the new normal of geopolitics Ben Buchanan |
title_full_unstemmed | The hacker and the state cyber attacks and the new normal of geopolitics Ben Buchanan |
title_short | The hacker and the state |
title_sort | the hacker and the state cyber attacks and the new normal of geopolitics |
title_sub | cyber attacks and the new normal of geopolitics |
topic | POLITICAL SCIENCE / Intelligence & Espionage bisacsh Cyber intelligence (Computer security) Cyberspace operations (Military science) Cyberspace Political aspects Cyberterrorism Hacking Political aspects Cyberterrorismus (DE-588)1118882725 gnd Geopolitik (DE-588)4156741-9 gnd Information warfare (DE-588)4461975-3 gnd Cyberattacke (DE-588)1075612675 gnd |
topic_facet | POLITICAL SCIENCE / Intelligence & Espionage Cyber intelligence (Computer security) Cyberspace operations (Military science) Cyberspace Political aspects Cyberterrorism Hacking Political aspects Cyberterrorismus Geopolitik Information warfare Cyberattacke |
url | https://www.degruyter.com/isbn/9780674246010 |
work_keys_str_mv | AT buchananben thehackerandthestatecyberattacksandthenewnormalofgeopolitics |