Cybersecurity and cyberwar :: what everyone needs to know /
A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Oxford :
Oxford University Press,
[2014]
|
Schriftenreihe: | What everyone needs to know.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of. |
Beschreibung: | 1 online resource (iii, 306 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780199918102 0199918104 1306081998 9781306081993 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn864907720 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 131210t20142014nyua ob 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d E7B |d YDXCP |d CCO |d N$T |d OCLCO |d OCLCQ |d IDEBK |d EBLCP |d MHW |d MEAUC |d AUD |d DEBSZ |d MOR |d Z5A |d MERUC |d OCLCQ |d SAV |d OCLCA |d ZEM |d OCLCA |d BAL |d UUM |d YDX |d CEF |d OCLCQ |d INT |d STF |d OCLCQ |d WYU |d TKN |d AGLDB |d OCL |d G3B |d IGB |d AUW |d BTN |d INTCL |d SNK |d DKC |d OCLCQ |d NJT |d OCLCQ |d TFW |d OCLCO |d IAC |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCL |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
015 | |a GBB301524 |2 bnb | ||
016 | 7 | |a 016246323 |2 Uk | |
019 | |a 862372354 |a 863595909 |a 962805954 |a 965341952 |a 1014223855 |a 1030218295 |a 1031565497 |a 1031868422 |a 1035504986 |a 1104696857 |a 1105951029 |a 1124330462 |a 1259487985 | ||
020 | |a 9780199918102 |q (electronic bk.) | ||
020 | |a 0199918104 |q (electronic bk.) | ||
020 | |a 1306081998 | ||
020 | |a 9781306081993 | ||
020 | |z 9780199918096 | ||
020 | |z 0199918090 | ||
020 | |z 9780199918119 | ||
020 | |z 0199918112 | ||
035 | |a (OCoLC)864907720 |z (OCoLC)862372354 |z (OCoLC)863595909 |z (OCoLC)962805954 |z (OCoLC)965341952 |z (OCoLC)1014223855 |z (OCoLC)1030218295 |z (OCoLC)1031565497 |z (OCoLC)1031868422 |z (OCoLC)1035504986 |z (OCoLC)1104696857 |z (OCoLC)1105951029 |z (OCoLC)1124330462 |z (OCoLC)1259487985 | ||
037 | |a 539450 |b MIL | ||
043 | |a n-us--- | ||
050 | 4 | |a QA76.9.A25 |b S562 2014eb | |
055 | 3 | |a QA76.9 A25 |b S546 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
084 | |a POL012000 |2 bisacsh | ||
049 | |a MAIN | ||
100 | 1 | |a Singer, P. W. |q (Peter Warren), |e author. |1 https://id.oclc.org/worldcat/entity/E39PBJdcyyGHxjqJw4mKfKqJDq |0 http://id.loc.gov/authorities/names/no2002091896 | |
245 | 1 | 0 | |a Cybersecurity and cyberwar : |b what everyone needs to know / |c P.W. Singer and Allan Friedman. |
264 | 1 | |a Oxford : |b Oxford University Press, |c [2014] | |
264 | 4 | |c ©2014 | |
300 | |a 1 online resource (iii, 306 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a What everyone needs to know | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index. | |
520 | |a A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of. | ||
588 | 0 | |a Print version record; online resource viewed February 9, 2021. | |
650 | 0 | |a Computer security |z United States. | |
650 | 0 | |a Computer networks |x Security measures |z United States. | |
650 | 0 | |a Cyberspace |x Security measures |z United States. | |
650 | 0 | |a Cyberterrorism |z United States |x Prevention. | |
650 | 0 | |a Information warfare |z United States |x Prevention. | |
650 | 0 | |a Cyberspace operations (Military science) |0 http://id.loc.gov/authorities/subjects/sh2013000988 | |
650 | 6 | |a Sécurité informatique |z États-Unis. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |z États-Unis. | |
650 | 6 | |a Cyberguerre (Science militaire) | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x International Security. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast | |
650 | 7 | |a Information warfare |x Prevention |2 fast | |
650 | 7 | |a Cyberterrorism |x Prevention |2 fast | |
650 | 7 | |a Cyberspace operations (Military science) |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
650 | 1 | 7 | |a Beveiliging. |2 gtt |0 (NL-LeOCL)078451183 |
650 | 1 | 7 | |a Internet. |2 gtt |0 (NL-LeOCL)101068689 |
650 | 7 | |a United States of America. |2 pplt | |
650 | 7 | |a Cyberspace. |2 pplt | |
650 | 7 | |a National security. |2 pplt | |
650 | 7 | |a Computer-related crime. |2 pplt | |
650 | 7 | |a Cyberwarfare. |2 pplt | |
650 | 7 | |a Information and communication technology. |2 pplt | |
650 | 7 | |a IT-säkerhet. |2 sao | |
650 | 7 | |a Datanät |x säkerhetsaspekter. |2 sao | |
650 | 7 | |a Cyberspace |x säkerhetsaspekter. |2 sao | |
650 | 7 | |a Cyberterrorism |x prevention. |2 sao | |
650 | 7 | |a Informationskrigföring. |2 sao | |
650 | 7 | |a IW |x computers |x information technology |x communications |x security |x terrorism |z USA. |2 sipri | |
700 | 1 | |a Friedman, Allan. |0 http://id.loc.gov/authorities/names/no2014015911 | |
776 | 0 | 8 | |i Print version: |a Singer, P.W. (Peter Warren). |t Cybersecurity and cyberwar. |d Oxford : Oxford University Press, [2014] |z 9780199918096 |w (DLC) 2013028127 |w (OCoLC)802324804 |
830 | 0 | |a What everyone needs to know. |0 http://id.loc.gov/authorities/names/no2011177964 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=657629 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL1538365 | ||
938 | |a ebrary |b EBRY |n ebr10792438 | ||
938 | |a EBSCOhost |b EBSC |n 657629 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26541403 | ||
938 | |a Internet Archive |b INAR |n cybersecuritycyb0000sing | ||
938 | |a YBP Library Services |b YANK |n 11319484 | ||
938 | |a YBP Library Services |b YANK |n 17012839 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn864907720 |
---|---|
_version_ | 1816882252982779904 |
adam_text | |
any_adam_object | |
author | Singer, P. W. (Peter Warren) |
author2 | Friedman, Allan |
author2_role | |
author2_variant | a f af |
author_GND | http://id.loc.gov/authorities/names/no2002091896 http://id.loc.gov/authorities/names/no2014015911 |
author_facet | Singer, P. W. (Peter Warren) Friedman, Allan |
author_role | aut |
author_sort | Singer, P. W. |
author_variant | p w s pw pws |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S562 2014eb |
callnumber-search | QA76.9.A25 S562 2014eb |
callnumber-sort | QA 276.9 A25 S562 42014EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index. |
ctrlnum | (OCoLC)864907720 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09561cam a2201081 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn864907720</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">131210t20142014nyua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">CCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MHW</subfield><subfield code="d">MEAUC</subfield><subfield code="d">AUD</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">MOR</subfield><subfield code="d">Z5A</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCA</subfield><subfield code="d">ZEM</subfield><subfield code="d">OCLCA</subfield><subfield code="d">BAL</subfield><subfield code="d">UUM</subfield><subfield code="d">YDX</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">TKN</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCL</subfield><subfield code="d">G3B</subfield><subfield code="d">IGB</subfield><subfield code="d">AUW</subfield><subfield code="d">BTN</subfield><subfield code="d">INTCL</subfield><subfield code="d">SNK</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NJT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TFW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">IAC</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB301524</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">016246323</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">862372354</subfield><subfield code="a">863595909</subfield><subfield code="a">962805954</subfield><subfield code="a">965341952</subfield><subfield code="a">1014223855</subfield><subfield code="a">1030218295</subfield><subfield code="a">1031565497</subfield><subfield code="a">1031868422</subfield><subfield code="a">1035504986</subfield><subfield code="a">1104696857</subfield><subfield code="a">1105951029</subfield><subfield code="a">1124330462</subfield><subfield code="a">1259487985</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199918102</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0199918104</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306081998</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306081993</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780199918096</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0199918090</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780199918119</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0199918112</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864907720</subfield><subfield code="z">(OCoLC)862372354</subfield><subfield code="z">(OCoLC)863595909</subfield><subfield code="z">(OCoLC)962805954</subfield><subfield code="z">(OCoLC)965341952</subfield><subfield code="z">(OCoLC)1014223855</subfield><subfield code="z">(OCoLC)1030218295</subfield><subfield code="z">(OCoLC)1031565497</subfield><subfield code="z">(OCoLC)1031868422</subfield><subfield code="z">(OCoLC)1035504986</subfield><subfield code="z">(OCoLC)1104696857</subfield><subfield code="z">(OCoLC)1105951029</subfield><subfield code="z">(OCoLC)1124330462</subfield><subfield code="z">(OCoLC)1259487985</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">539450</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S562 2014eb</subfield></datafield><datafield tag="055" ind1=" " ind2="3"><subfield code="a">QA76.9 A25</subfield><subfield code="b">S546</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singer, P. W.</subfield><subfield code="q">(Peter Warren),</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJdcyyGHxjqJw4mKfKqJDq</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2002091896</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and cyberwar :</subfield><subfield code="b">what everyone needs to know /</subfield><subfield code="c">P.W. Singer and Allan Friedman.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford :</subfield><subfield code="b">Oxford University Press,</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (iii, 306 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">What everyone needs to know</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record; online resource viewed February 9, 2021.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000988</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberguerre (Science militaire)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">International Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Beveiliging.</subfield><subfield code="2">gtt</subfield><subfield code="0">(NL-LeOCL)078451183</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Internet.</subfield><subfield code="2">gtt</subfield><subfield code="0">(NL-LeOCL)101068689</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">United States of America.</subfield><subfield code="2">pplt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace.</subfield><subfield code="2">pplt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security.</subfield><subfield code="2">pplt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer-related crime.</subfield><subfield code="2">pplt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberwarfare.</subfield><subfield code="2">pplt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information and communication technology.</subfield><subfield code="2">pplt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">IT-säkerhet.</subfield><subfield code="2">sao</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Datanät</subfield><subfield code="x">säkerhetsaspekter.</subfield><subfield code="2">sao</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">säkerhetsaspekter.</subfield><subfield code="2">sao</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="x">prevention.</subfield><subfield code="2">sao</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informationskrigföring.</subfield><subfield code="2">sao</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">IW</subfield><subfield code="x">computers</subfield><subfield code="x">information technology</subfield><subfield code="x">communications</subfield><subfield code="x">security</subfield><subfield code="x">terrorism</subfield><subfield code="z">USA.</subfield><subfield code="2">sipri</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Friedman, Allan.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2014015911</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Singer, P.W. (Peter Warren).</subfield><subfield code="t">Cybersecurity and cyberwar.</subfield><subfield code="d">Oxford : Oxford University Press, [2014]</subfield><subfield code="z">9780199918096</subfield><subfield code="w">(DLC) 2013028127</subfield><subfield code="w">(OCoLC)802324804</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">What everyone needs to know.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011177964</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=657629</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1538365</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10792438</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">657629</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis26541403</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">cybersecuritycyb0000sing</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11319484</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">17012839</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBA-ocn864907720 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:25:40Z |
institution | BVB |
isbn | 9780199918102 0199918104 1306081998 9781306081993 |
language | English |
oclc_num | 864907720 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (iii, 306 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Oxford University Press, |
record_format | marc |
series | What everyone needs to know. |
series2 | What everyone needs to know |
spelling | Singer, P. W. (Peter Warren), author. https://id.oclc.org/worldcat/entity/E39PBJdcyyGHxjqJw4mKfKqJDq http://id.loc.gov/authorities/names/no2002091896 Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman. Oxford : Oxford University Press, [2014] ©2014 1 online resource (iii, 306 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier What everyone needs to know Includes bibliographical references and index. INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index. A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of. Print version record; online resource viewed February 9, 2021. Computer security United States. Computer networks Security measures United States. Cyberspace Security measures United States. Cyberterrorism United States Prevention. Information warfare United States Prevention. Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Sécurité informatique États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. Cyberguerre (Science militaire) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh POLITICAL SCIENCE Political Freedom & Security International Security. bisacsh Cyberspace Security measures fast Information warfare Prevention fast Cyberterrorism Prevention fast Cyberspace operations (Military science) fast Computer networks Security measures fast Computer security fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Beveiliging. gtt (NL-LeOCL)078451183 Internet. gtt (NL-LeOCL)101068689 United States of America. pplt Cyberspace. pplt National security. pplt Computer-related crime. pplt Cyberwarfare. pplt Information and communication technology. pplt IT-säkerhet. sao Datanät säkerhetsaspekter. sao Cyberspace säkerhetsaspekter. sao Cyberterrorism prevention. sao Informationskrigföring. sao IW computers information technology communications security terrorism USA. sipri Friedman, Allan. http://id.loc.gov/authorities/names/no2014015911 Print version: Singer, P.W. (Peter Warren). Cybersecurity and cyberwar. Oxford : Oxford University Press, [2014] 9780199918096 (DLC) 2013028127 (OCoLC)802324804 What everyone needs to know. http://id.loc.gov/authorities/names/no2011177964 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=657629 Volltext |
spellingShingle | Singer, P. W. (Peter Warren) Cybersecurity and cyberwar : what everyone needs to know / What everyone needs to know. INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index. Computer security United States. Computer networks Security measures United States. Cyberspace Security measures United States. Cyberterrorism United States Prevention. Information warfare United States Prevention. Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Sécurité informatique États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. Cyberguerre (Science militaire) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh POLITICAL SCIENCE Political Freedom & Security International Security. bisacsh Cyberspace Security measures fast Information warfare Prevention fast Cyberterrorism Prevention fast Cyberspace operations (Military science) fast Computer networks Security measures fast Computer security fast Beveiliging. gtt (NL-LeOCL)078451183 Internet. gtt (NL-LeOCL)101068689 United States of America. pplt Cyberspace. pplt National security. pplt Computer-related crime. pplt Cyberwarfare. pplt Information and communication technology. pplt IT-säkerhet. sao Datanät säkerhetsaspekter. sao Cyberspace säkerhetsaspekter. sao Cyberterrorism prevention. sao Informationskrigföring. sao IW computers information technology communications security terrorism USA. sipri |
subject_GND | http://id.loc.gov/authorities/subjects/sh2013000988 (NL-LeOCL)078451183 (NL-LeOCL)101068689 |
title | Cybersecurity and cyberwar : what everyone needs to know / |
title_auth | Cybersecurity and cyberwar : what everyone needs to know / |
title_exact_search | Cybersecurity and cyberwar : what everyone needs to know / |
title_full | Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman. |
title_fullStr | Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman. |
title_full_unstemmed | Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman. |
title_short | Cybersecurity and cyberwar : |
title_sort | cybersecurity and cyberwar what everyone needs to know |
title_sub | what everyone needs to know / |
topic | Computer security United States. Computer networks Security measures United States. Cyberspace Security measures United States. Cyberterrorism United States Prevention. Information warfare United States Prevention. Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Sécurité informatique États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. Cyberguerre (Science militaire) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh POLITICAL SCIENCE Political Freedom & Security International Security. bisacsh Cyberspace Security measures fast Information warfare Prevention fast Cyberterrorism Prevention fast Cyberspace operations (Military science) fast Computer networks Security measures fast Computer security fast Beveiliging. gtt (NL-LeOCL)078451183 Internet. gtt (NL-LeOCL)101068689 United States of America. pplt Cyberspace. pplt National security. pplt Computer-related crime. pplt Cyberwarfare. pplt Information and communication technology. pplt IT-säkerhet. sao Datanät säkerhetsaspekter. sao Cyberspace säkerhetsaspekter. sao Cyberterrorism prevention. sao Informationskrigföring. sao IW computers information technology communications security terrorism USA. sipri |
topic_facet | Computer security United States. Computer networks Security measures United States. Cyberspace Security measures United States. Cyberterrorism United States Prevention. Information warfare United States Prevention. Cyberspace operations (Military science) Sécurité informatique États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. Cyberguerre (Science militaire) COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. POLITICAL SCIENCE Political Freedom & Security International Security. Cyberspace Security measures Information warfare Prevention Cyberterrorism Prevention Computer networks Security measures Computer security United States Beveiliging. Internet. United States of America. Cyberspace. National security. Computer-related crime. Cyberwarfare. Information and communication technology. IT-säkerhet. Datanät säkerhetsaspekter. Cyberspace säkerhetsaspekter. Cyberterrorism prevention. Informationskrigföring. IW computers information technology communications security terrorism USA. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=657629 |
work_keys_str_mv | AT singerpw cybersecurityandcyberwarwhateveryoneneedstoknow AT friedmanallan cybersecurityandcyberwarwhateveryoneneedstoknow |