The Dark Sides of the Internet: On Cyber Threats and Information Warfare
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Frankfurt a.M.
Peter Lang GmbH, Internationaler Verlag der Wissenschaften
2012
|
Ausgabe: | 1st, New ed |
Schlagworte: | |
Online-Zugang: | UER01 Volltext |
Beschreibung: | Online resource; title from title screen (viewed June 27, 2019) |
Beschreibung: | 1 Online-Ressource (170 Seiten) |
ISBN: | 9783653025026 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047019847 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201120s2012 |||| o||u| ||||||eng d | ||
020 | |a 9783653025026 |9 978-3-653-02502-6 | ||
024 | 7 | |a 10.3726/978-3-653-02502-6 |2 doi | |
024 | 3 | |a 9783653025026 | |
035 | |a (ZDB-114-LAC)9783653025026 | ||
035 | |a (OCoLC)1224008677 | ||
035 | |a (DE-599)BVBBV047019847 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-29 | ||
084 | |a AP 18420 |0 (DE-625)7052: |2 rvk | ||
084 | |a MS 7965 |0 (DE-625)123801: |2 rvk | ||
100 | 1 | |a Heickerö, Roland |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Dark Sides of the Internet |b On Cyber Threats and Information Warfare |c Roland Heickerö |
250 | |a 1st, New ed | ||
264 | 1 | |a Frankfurt a.M. |b Peter Lang GmbH, Internationaler Verlag der Wissenschaften |c 2012 | |
264 | 4 | |c © 2013 | |
300 | |a 1 Online-Ressource (170 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title screen (viewed June 27, 2019) | ||
505 | 8 | |a The rapid development in information technology during the last few decades has not only given us greater opportunities to freely search for information and contacts. The growth of the Internet has also created new opportunities for criminal organisations, political activists and terrorists to threaten individuals, companies and countries. Individuals and organisations are also increasingly the targets of attacks and espionage via the web. There are various kinds of illegitimate and criminal activities. Every modern state thus has to create strategies and courses of action in order to protect information, networks and computers that are vital to society from malicious cyber activities. Creating secure systems and minimising risks of information being leaked or tampered with should be a prioritised task. It is also important to understand what threats arise from the information technological revolution. The purpose of this book is to give a broad background to the development of the dark side of the internet and its consequences. It is not about scaremongering, but about creating understanding and knowledge and thus preparedness in order to handle detrimental activities. It describes the changes in progress and what they may mean to society, companies and individuals as well as to the military and police | |
505 | 8 | |a «The book is very informative and is a pleasure to read. It communicates well to its readers on the various aspects of information warfare and cyber threats, and their consequences. The discussions in the book are followed up by various examples and case studies, helping improve understanding on the issue highlighted. Given the dangers of cyber threats, I recommend this book as a must-read for any internet user, irrespective of background.» (Dinesh Sathyamoorthy, Science & Technology Research Institute for Defence, Ministry of Defence, Malaysia) | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783631624784 |
856 | 4 | 0 | |u https://www.peterlang.com/view/product/16068?format=EPDF |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-114-LAC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032427330 | ||
966 | e | |u https://www.peterlang.com/view/product/16068?format=EPDF |l UER01 |p ZDB-114-LAC |q UER_P2E_LAC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181983437258752 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Heickerö, Roland |
author_facet | Heickerö, Roland |
author_role | aut |
author_sort | Heickerö, Roland |
author_variant | r h rh |
building | Verbundindex |
bvnumber | BV047019847 |
classification_rvk | AP 18420 MS 7965 |
collection | ZDB-114-LAC |
contents | The rapid development in information technology during the last few decades has not only given us greater opportunities to freely search for information and contacts. The growth of the Internet has also created new opportunities for criminal organisations, political activists and terrorists to threaten individuals, companies and countries. Individuals and organisations are also increasingly the targets of attacks and espionage via the web. There are various kinds of illegitimate and criminal activities. Every modern state thus has to create strategies and courses of action in order to protect information, networks and computers that are vital to society from malicious cyber activities. Creating secure systems and minimising risks of information being leaked or tampered with should be a prioritised task. It is also important to understand what threats arise from the information technological revolution. The purpose of this book is to give a broad background to the development of the dark side of the internet and its consequences. It is not about scaremongering, but about creating understanding and knowledge and thus preparedness in order to handle detrimental activities. It describes the changes in progress and what they may mean to society, companies and individuals as well as to the military and police «The book is very informative and is a pleasure to read. It communicates well to its readers on the various aspects of information warfare and cyber threats, and their consequences. The discussions in the book are followed up by various examples and case studies, helping improve understanding on the issue highlighted. Given the dangers of cyber threats, I recommend this book as a must-read for any internet user, irrespective of background.» (Dinesh Sathyamoorthy, Science & Technology Research Institute for Defence, Ministry of Defence, Malaysia) |
ctrlnum | (ZDB-114-LAC)9783653025026 (OCoLC)1224008677 (DE-599)BVBBV047019847 |
discipline | Allgemeines Soziologie |
discipline_str_mv | Allgemeines Soziologie |
edition | 1st, New ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03725nmm a2200493zc 4500</leader><controlfield tag="001">BV047019847</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201120s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783653025026</subfield><subfield code="9">978-3-653-02502-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.3726/978-3-653-02502-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783653025026</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-114-LAC)9783653025026</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1224008677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047019847</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 18420</subfield><subfield code="0">(DE-625)7052:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 7965</subfield><subfield code="0">(DE-625)123801:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Heickerö, Roland</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Dark Sides of the Internet</subfield><subfield code="b">On Cyber Threats and Information Warfare</subfield><subfield code="c">Roland Heickerö</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st, New ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Frankfurt a.M.</subfield><subfield code="b">Peter Lang GmbH, Internationaler Verlag der Wissenschaften</subfield><subfield code="c">2012</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (170 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title screen (viewed June 27, 2019)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The rapid development in information technology during the last few decades has not only given us greater opportunities to freely search for information and contacts. The growth of the Internet has also created new opportunities for criminal organisations, political activists and terrorists to threaten individuals, companies and countries. Individuals and organisations are also increasingly the targets of attacks and espionage via the web. There are various kinds of illegitimate and criminal activities. Every modern state thus has to create strategies and courses of action in order to protect information, networks and computers that are vital to society from malicious cyber activities. Creating secure systems and minimising risks of information being leaked or tampered with should be a prioritised task. It is also important to understand what threats arise from the information technological revolution. The purpose of this book is to give a broad background to the development of the dark side of the internet and its consequences. It is not about scaremongering, but about creating understanding and knowledge and thus preparedness in order to handle detrimental activities. It describes the changes in progress and what they may mean to society, companies and individuals as well as to the military and police</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">«The book is very informative and is a pleasure to read. It communicates well to its readers on the various aspects of information warfare and cyber threats, and their consequences. The discussions in the book are followed up by various examples and case studies, helping improve understanding on the issue highlighted. Given the dangers of cyber threats, I recommend this book as a must-read for any internet user, irrespective of background.» (Dinesh Sathyamoorthy, Science & Technology Research Institute for Defence, Ministry of Defence, Malaysia)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783631624784</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.peterlang.com/view/product/16068?format=EPDF</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-114-LAC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032427330</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.peterlang.com/view/product/16068?format=EPDF</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-114-LAC</subfield><subfield code="q">UER_P2E_LAC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047019847 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:59:04Z |
indexdate | 2024-07-10T09:00:19Z |
institution | BVB |
isbn | 9783653025026 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032427330 |
oclc_num | 1224008677 |
open_access_boolean | |
owner | DE-29 |
owner_facet | DE-29 |
physical | 1 Online-Ressource (170 Seiten) |
psigel | ZDB-114-LAC ZDB-114-LAC UER_P2E_LAC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Peter Lang GmbH, Internationaler Verlag der Wissenschaften |
record_format | marc |
spelling | Heickerö, Roland Verfasser aut The Dark Sides of the Internet On Cyber Threats and Information Warfare Roland Heickerö 1st, New ed Frankfurt a.M. Peter Lang GmbH, Internationaler Verlag der Wissenschaften 2012 © 2013 1 Online-Ressource (170 Seiten) txt rdacontent c rdamedia cr rdacarrier Online resource; title from title screen (viewed June 27, 2019) The rapid development in information technology during the last few decades has not only given us greater opportunities to freely search for information and contacts. The growth of the Internet has also created new opportunities for criminal organisations, political activists and terrorists to threaten individuals, companies and countries. Individuals and organisations are also increasingly the targets of attacks and espionage via the web. There are various kinds of illegitimate and criminal activities. Every modern state thus has to create strategies and courses of action in order to protect information, networks and computers that are vital to society from malicious cyber activities. Creating secure systems and minimising risks of information being leaked or tampered with should be a prioritised task. It is also important to understand what threats arise from the information technological revolution. The purpose of this book is to give a broad background to the development of the dark side of the internet and its consequences. It is not about scaremongering, but about creating understanding and knowledge and thus preparedness in order to handle detrimental activities. It describes the changes in progress and what they may mean to society, companies and individuals as well as to the military and police «The book is very informative and is a pleasure to read. It communicates well to its readers on the various aspects of information warfare and cyber threats, and their consequences. The discussions in the book are followed up by various examples and case studies, helping improve understanding on the issue highlighted. Given the dangers of cyber threats, I recommend this book as a must-read for any internet user, irrespective of background.» (Dinesh Sathyamoorthy, Science & Technology Research Institute for Defence, Ministry of Defence, Malaysia) Information warfare (DE-588)4461975-3 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s DE-604 Information warfare (DE-588)4461975-3 s Erscheint auch als Druck-Ausgabe 9783631624784 https://www.peterlang.com/view/product/16068?format=EPDF Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Heickerö, Roland The Dark Sides of the Internet On Cyber Threats and Information Warfare The rapid development in information technology during the last few decades has not only given us greater opportunities to freely search for information and contacts. The growth of the Internet has also created new opportunities for criminal organisations, political activists and terrorists to threaten individuals, companies and countries. Individuals and organisations are also increasingly the targets of attacks and espionage via the web. There are various kinds of illegitimate and criminal activities. Every modern state thus has to create strategies and courses of action in order to protect information, networks and computers that are vital to society from malicious cyber activities. Creating secure systems and minimising risks of information being leaked or tampered with should be a prioritised task. It is also important to understand what threats arise from the information technological revolution. The purpose of this book is to give a broad background to the development of the dark side of the internet and its consequences. It is not about scaremongering, but about creating understanding and knowledge and thus preparedness in order to handle detrimental activities. It describes the changes in progress and what they may mean to society, companies and individuals as well as to the military and police «The book is very informative and is a pleasure to read. It communicates well to its readers on the various aspects of information warfare and cyber threats, and their consequences. The discussions in the book are followed up by various examples and case studies, helping improve understanding on the issue highlighted. Given the dangers of cyber threats, I recommend this book as a must-read for any internet user, irrespective of background.» (Dinesh Sathyamoorthy, Science & Technology Research Institute for Defence, Ministry of Defence, Malaysia) Information warfare (DE-588)4461975-3 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)7864395-8 |
title | The Dark Sides of the Internet On Cyber Threats and Information Warfare |
title_auth | The Dark Sides of the Internet On Cyber Threats and Information Warfare |
title_exact_search | The Dark Sides of the Internet On Cyber Threats and Information Warfare |
title_exact_search_txtP | The Dark Sides of the Internet On Cyber Threats and Information Warfare |
title_full | The Dark Sides of the Internet On Cyber Threats and Information Warfare Roland Heickerö |
title_fullStr | The Dark Sides of the Internet On Cyber Threats and Information Warfare Roland Heickerö |
title_full_unstemmed | The Dark Sides of the Internet On Cyber Threats and Information Warfare Roland Heickerö |
title_short | The Dark Sides of the Internet |
title_sort | the dark sides of the internet on cyber threats and information warfare |
title_sub | On Cyber Threats and Information Warfare |
topic | Information warfare (DE-588)4461975-3 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Information warfare Internetkriminalität |
url | https://www.peterlang.com/view/product/16068?format=EPDF |
work_keys_str_mv | AT heickeroroland thedarksidesoftheinternetoncyberthreatsandinformationwarfare |