Understanding cyber warfare: politics, policy and strategy
"This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The 2nd edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations a...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; New York
Routledge, Taylor & Francis Group
2023
|
Ausgabe: | Second edition |
Schlagworte: | |
Zusammenfassung: | "This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The 2nd edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations and operational practice associated with computer network attack, computer network exploitation, and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors. Specifically, the book provides a comprehensive overview of several key issue areas: - The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation, and defense; - An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of international relations (IR), security studies, psychology and Science, Technology and Society (STS) studies; - Current national perspectives, policies, doctrines, and strategies relevant to cyber warfare; - An examination of key challenges in international law, norm development and deterrence; and - The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict. This textbook will be essential reading for students of cybersecurity/cyber conflict and information warfare, and highly recommended for students of intelligence studies, security and strategic studies, defense policy, and International Relations in general |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxiii, 340 Seiten Diagramme, aArten |
ISBN: | 9781032159317 9781032159393 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049331433 | ||
003 | DE-604 | ||
005 | 20231122 | ||
007 | t | ||
008 | 230919s2023 |||| |||| 00||| eng d | ||
020 | |a 9781032159317 |c pbk. |9 978-1-03-215931-7 | ||
020 | |a 9781032159393 |c hbk. |9 978-1-03-215939-3 | ||
035 | |a (OCoLC)1371239929 | ||
035 | |a (DE-599)BVBBV049331433 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
082 | 0 | |a 355.4 |2 23 | |
084 | |a MK 3100 |0 (DE-625)123043: |2 rvk | ||
100 | 1 | |a Whyte, Christopher |d 1988- |e Verfasser |0 (DE-588)1174006234 |4 aut | |
245 | 1 | 0 | |a Understanding cyber warfare |b politics, policy and strategy |c Christopher Whyte and Brian M. Mazanec |
250 | |a Second edition | ||
264 | 1 | |a London ; New York |b Routledge, Taylor & Francis Group |c 2023 | |
300 | |a xxiii, 340 Seiten |b Diagramme, aArten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a "This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The 2nd edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations and operational practice associated with computer network attack, computer network exploitation, and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors. Specifically, the book provides a comprehensive overview of several key issue areas: - The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation, and defense; - An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of international relations (IR), security studies, psychology and Science, Technology and Society (STS) studies; - Current national perspectives, policies, doctrines, and strategies relevant to cyber warfare; - An examination of key challenges in international law, norm development and deterrence; and - The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict. This textbook will be essential reading for students of cybersecurity/cyber conflict and information warfare, and highly recommended for students of intelligence studies, security and strategic studies, defense policy, and International Relations in general | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
653 | 0 | |a Cyberspace operations (Military science) | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Mazanec, Brian M. |e Verfasser |0 (DE-588)108213449X |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9781003246398 |
940 | 1 | |q BSB_NED_20231122 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034592169 | ||
942 | 1 | 1 | |c 909 |e 22/bsb |f 0905 |
942 | 1 | 1 | |c 302.2 |e 22/bsb |f 0905 |
Datensatz im Suchindex
_version_ | 1804185847811014656 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Whyte, Christopher 1988- Mazanec, Brian M. |
author_GND | (DE-588)1174006234 (DE-588)108213449X |
author_facet | Whyte, Christopher 1988- Mazanec, Brian M. |
author_role | aut aut |
author_sort | Whyte, Christopher 1988- |
author_variant | c w cw b m m bm bmm |
building | Verbundindex |
bvnumber | BV049331433 |
classification_rvk | MK 3100 |
ctrlnum | (OCoLC)1371239929 (DE-599)BVBBV049331433 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Politologie Militärwissenschaft |
discipline_str_mv | Politologie Militärwissenschaft |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03819nam a2200541 c 4500</leader><controlfield tag="001">BV049331433</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231122 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230919s2023 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032159317</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-03-215931-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032159393</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-03-215939-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1371239929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049331433</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MK 3100</subfield><subfield code="0">(DE-625)123043:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Whyte, Christopher</subfield><subfield code="d">1988-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1174006234</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding cyber warfare</subfield><subfield code="b">politics, policy and strategy</subfield><subfield code="c">Christopher Whyte and Brian M. Mazanec</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York</subfield><subfield code="b">Routledge, Taylor & Francis Group</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 340 Seiten</subfield><subfield code="b">Diagramme, aArten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The 2nd edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations and operational practice associated with computer network attack, computer network exploitation, and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors. Specifically, the book provides a comprehensive overview of several key issue areas: - The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation, and defense; - An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of international relations (IR), security studies, psychology and Science, Technology and Society (STS) studies; - Current national perspectives, policies, doctrines, and strategies relevant to cyber warfare; - An examination of key challenges in international law, norm development and deterrence; and - The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict. This textbook will be essential reading for students of cybersecurity/cyber conflict and information warfare, and highly recommended for students of intelligence studies, security and strategic studies, defense policy, and International Relations in general</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazanec, Brian M.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)108213449X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9781003246398</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BSB_NED_20231122</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034592169</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield></datafield></record></collection> |
id | DE-604.BV049331433 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:45:19Z |
indexdate | 2024-07-10T10:01:45Z |
institution | BVB |
isbn | 9781032159317 9781032159393 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034592169 |
oclc_num | 1371239929 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | xxiii, 340 Seiten Diagramme, aArten |
psigel | BSB_NED_20231122 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Routledge, Taylor & Francis Group |
record_format | marc |
spelling | Whyte, Christopher 1988- Verfasser (DE-588)1174006234 aut Understanding cyber warfare politics, policy and strategy Christopher Whyte and Brian M. Mazanec Second edition London ; New York Routledge, Taylor & Francis Group 2023 xxiii, 340 Seiten Diagramme, aArten txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index "This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The 2nd edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations and operational practice associated with computer network attack, computer network exploitation, and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors. Specifically, the book provides a comprehensive overview of several key issue areas: - The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation, and defense; - An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of international relations (IR), security studies, psychology and Science, Technology and Society (STS) studies; - Current national perspectives, policies, doctrines, and strategies relevant to cyber warfare; - An examination of key challenges in international law, norm development and deterrence; and - The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict. This textbook will be essential reading for students of cybersecurity/cyber conflict and information warfare, and highly recommended for students of intelligence studies, security and strategic studies, defense policy, and International Relations in general Internet (DE-588)4308416-3 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Cyberspace operations (Military science) Information warfare (DE-588)4461975-3 s Cyberspace (DE-588)4266146-8 s Sicherheit (DE-588)4054790-5 s DE-604 Internet (DE-588)4308416-3 s Innere Sicherheit (DE-588)4127888-4 s Mazanec, Brian M. Verfasser (DE-588)108213449X aut Erscheint auch als Online-Ausgabe 9781003246398 |
spellingShingle | Whyte, Christopher 1988- Mazanec, Brian M. Understanding cyber warfare politics, policy and strategy Internet (DE-588)4308416-3 gnd Sicherheit (DE-588)4054790-5 gnd Information warfare (DE-588)4461975-3 gnd Cyberspace (DE-588)4266146-8 gnd Innere Sicherheit (DE-588)4127888-4 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4054790-5 (DE-588)4461975-3 (DE-588)4266146-8 (DE-588)4127888-4 |
title | Understanding cyber warfare politics, policy and strategy |
title_auth | Understanding cyber warfare politics, policy and strategy |
title_exact_search | Understanding cyber warfare politics, policy and strategy |
title_exact_search_txtP | Understanding cyber warfare politics, policy and strategy |
title_full | Understanding cyber warfare politics, policy and strategy Christopher Whyte and Brian M. Mazanec |
title_fullStr | Understanding cyber warfare politics, policy and strategy Christopher Whyte and Brian M. Mazanec |
title_full_unstemmed | Understanding cyber warfare politics, policy and strategy Christopher Whyte and Brian M. Mazanec |
title_short | Understanding cyber warfare |
title_sort | understanding cyber warfare politics policy and strategy |
title_sub | politics, policy and strategy |
topic | Internet (DE-588)4308416-3 gnd Sicherheit (DE-588)4054790-5 gnd Information warfare (DE-588)4461975-3 gnd Cyberspace (DE-588)4266146-8 gnd Innere Sicherheit (DE-588)4127888-4 gnd |
topic_facet | Internet Sicherheit Information warfare Cyberspace Innere Sicherheit |
work_keys_str_mv | AT whytechristopher understandingcyberwarfarepoliticspolicyandstrategy AT mazanecbrianm understandingcyberwarfarepoliticspolicyandstrategy |