Cyber warfare :: a reference handbook /
Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. As the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of infor...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Barbara, California :
ABC-CLIO,
[2015]
|
Schriftenreihe: | Contemporary world issues.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. As the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This unique work--the only of its kind to include an overview of other cyber warfare literature--emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers. |
Beschreibung: | 1 online resource (xvi, 340 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781610694445 1610694449 9798400636486 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn903358513 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr mn||||||||| | ||
008 | 150213t20152015caua ob 001 0 eng d | ||
010 | |z 2014038753 | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d IDEBK |d TEFOD |d CDX |d IAT |d OSU |d YDXCP |d B24X7 |d AX@ |d COO |d EBLCP |d DEBSZ |d OCLCO |d TEFOD |d GGVRL |d IDB |d LIV |d OCLCQ |d MERUC |d OCLCQ |d OCLCA |d UUM |d MNM |d ORZ |d OCLCF |d WRM |d RVA |d OCLCQ |d UKAHL |d OCLCQ |d BRF |d INARC |d OCLCO |d OCL |d OCLCQ |d YDX |d OCLCO |d BLOOM |d OCLCL | ||
019 | |a 903858102 |a 1301967323 |a 1418754687 | ||
020 | |a 9781610694445 |q (electronic bk.) | ||
020 | |a 1610694449 |q (electronic bk.) | ||
020 | |z 9781610694438 | ||
020 | |z 1610694430 | ||
020 | |a 9798400636486 |q (online) | ||
024 | 7 | |a 10.5040/9798400636486 |2 doi | |
035 | |a (OCoLC)903358513 |z (OCoLC)903858102 |z (OCoLC)1301967323 |z (OCoLC)1418754687 | ||
037 | |a 8DF7767C-0B84-4B2E-A0D1-037150B93624 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a U163 |b .S66 2015eb | |
072 | 7 | |a HIS |x 027130 |2 bisacsh | |
072 | 7 | |a TEC |x 025000 |2 bisacsh | |
082 | 7 | |a 355.4 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Springer, Paul J., |e author. |0 http://id.loc.gov/authorities/names/n2009068576 | |
245 | 1 | 0 | |a Cyber warfare : |b a reference handbook / |c Paul J. Springer. |
246 | 3 | |a Cyberwarfare, a reference handbook | |
264 | 1 | |a Santa Barbara, California : |b ABC-CLIO, |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (xvi, 340 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Contemporary world issues, science, technology, and medicine | |
520 | |a Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. As the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This unique work--the only of its kind to include an overview of other cyber warfare literature--emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology. | |
588 | 0 | |a Online resource; title from digital title page (viewed on May 25, 2018). | |
532 | 0 | |a Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily | |
650 | 0 | |a Cyberspace operations (Military science) |0 http://id.loc.gov/authorities/subjects/sh2013000988 | |
650 | 0 | |a Cyberspace |x Security measures |x History. | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 6 | |a Cyberguerre (Science militaire) | |
650 | 7 | |a HISTORY |x Military |x Other. |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Military Science. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Cyberspace operations (Military science) |2 fast | |
650 | 7 | |a Cyberterrorism |x Prevention |2 fast | |
655 | 7 | |a History |2 fast | |
758 | |i has work: |a Cyber warfare (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGBKdDxYRxfV8Dk9vFJ99P |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Springer, Paul J. |t Cyber warfare. |d Santa Barbara, California : ABC-CLIO, [2015] |z 9781610694438 |w (DLC) 2014038753 |w (OCoLC)881439869 |
830 | 0 | |a Contemporary world issues. |0 http://id.loc.gov/authorities/names/n86726709 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=955572 |3 Volltext |
938 | |a YBP Library Services |b YANK |n 305961608 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH41527862 | ||
938 | |a YBP Library Services |b YANK |n 20345488 | ||
938 | |a ABC-Clio |b ABCC |n ABC1610694449 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH28282181 | ||
938 | |a Books 24x7 |b B247 |n bkg00081639 | ||
938 | |a Coutts Information Services |b COUT |n 30976194 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1953333 | ||
938 | |a EBSCOhost |b EBSC |n 955572 | ||
938 | |a Cengage Learning |b GVRL |n GVRL3CHF | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis30976194 | ||
938 | |a Internet Archive |b INAR |n cyberwarfarerefe0000spri | ||
938 | |a YBP Library Services |b YANK |n 12294399 | ||
938 | |a Bloomsbury Publishing |b BLOO |n ABC1610694449 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn903358513 |
---|---|
_version_ | 1816882303312330752 |
adam_text | |
any_adam_object | |
author | Springer, Paul J. |
author_GND | http://id.loc.gov/authorities/names/n2009068576 |
author_facet | Springer, Paul J. |
author_role | aut |
author_sort | Springer, Paul J. |
author_variant | p j s pj pjs |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 .S66 2015eb |
callnumber-search | U163 .S66 2015eb |
callnumber-sort | U 3163 S66 42015EB |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology. |
ctrlnum | (OCoLC)903358513 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05460cam a2200841 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn903358513</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr mn|||||||||</controlfield><controlfield tag="008">150213t20152015caua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2014038753</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">TEFOD</subfield><subfield code="d">CDX</subfield><subfield code="d">IAT</subfield><subfield code="d">OSU</subfield><subfield code="d">YDXCP</subfield><subfield code="d">B24X7</subfield><subfield code="d">AX@</subfield><subfield code="d">COO</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">GGVRL</subfield><subfield code="d">IDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UUM</subfield><subfield code="d">MNM</subfield><subfield code="d">ORZ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">WRM</subfield><subfield code="d">RVA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BRF</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCO</subfield><subfield code="d">BLOOM</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">903858102</subfield><subfield code="a">1301967323</subfield><subfield code="a">1418754687</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781610694445</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1610694449</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781610694438</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1610694430</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798400636486</subfield><subfield code="q">(online)</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.5040/9798400636486</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)903358513</subfield><subfield code="z">(OCoLC)903858102</subfield><subfield code="z">(OCoLC)1301967323</subfield><subfield code="z">(OCoLC)1418754687</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">8DF7767C-0B84-4B2E-A0D1-037150B93624</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.S66 2015eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027130</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">025000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Springer, Paul J.,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2009068576</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare :</subfield><subfield code="b">a reference handbook /</subfield><subfield code="c">Paul J. Springer.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Cyberwarfare, a reference handbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Barbara, California :</subfield><subfield code="b">ABC-CLIO,</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 340 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Contemporary world issues, science, technology, and medicine</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. As the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This unique work--the only of its kind to include an overview of other cyber warfare literature--emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on May 25, 2018).</subfield></datafield><datafield tag="532" ind1="0" ind2=" "><subfield code="a">Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000988</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="x">History.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberguerre (Science militaire)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY</subfield><subfield code="x">Military</subfield><subfield code="x">Other.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Military Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">History</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber warfare (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGBKdDxYRxfV8Dk9vFJ99P</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Springer, Paul J.</subfield><subfield code="t">Cyber warfare.</subfield><subfield code="d">Santa Barbara, California : ABC-CLIO, [2015]</subfield><subfield code="z">9781610694438</subfield><subfield code="w">(DLC) 2014038753</subfield><subfield code="w">(OCoLC)881439869</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Contemporary world issues.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n86726709</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=955572</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">305961608</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH41527862</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">20345488</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ABC-Clio</subfield><subfield code="b">ABCC</subfield><subfield code="n">ABC1610694449</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH28282181</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bkg00081639</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">30976194</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1953333</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">955572</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Cengage Learning</subfield><subfield code="b">GVRL</subfield><subfield code="n">GVRL3CHF</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis30976194</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">cyberwarfarerefe0000spri</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12294399</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Bloomsbury Publishing</subfield><subfield code="b">BLOO</subfield><subfield code="n">ABC1610694449</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | History fast |
genre_facet | History |
id | ZDB-4-EBA-ocn903358513 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:28Z |
institution | BVB |
isbn | 9781610694445 1610694449 9798400636486 |
language | English |
oclc_num | 903358513 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 340 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | ABC-CLIO, |
record_format | marc |
series | Contemporary world issues. |
series2 | Contemporary world issues, science, technology, and medicine |
spelling | Springer, Paul J., author. http://id.loc.gov/authorities/names/n2009068576 Cyber warfare : a reference handbook / Paul J. Springer. Cyberwarfare, a reference handbook Santa Barbara, California : ABC-CLIO, [2015] ©2015 1 online resource (xvi, 340 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Contemporary world issues, science, technology, and medicine Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. As the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This unique work--the only of its kind to include an overview of other cyber warfare literature--emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers. Includes bibliographical references and index. Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology. Online resource; title from digital title page (viewed on May 25, 2018). Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberspace Security measures History. Cyberterrorism Prevention. Computer crimes Prevention. Cyberguerre (Science militaire) HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace Security measures fast Computer crimes Prevention fast Cyberspace operations (Military science) fast Cyberterrorism Prevention fast History fast has work: Cyber warfare (Text) https://id.oclc.org/worldcat/entity/E39PCGBKdDxYRxfV8Dk9vFJ99P https://id.oclc.org/worldcat/ontology/hasWork Print version: Springer, Paul J. Cyber warfare. Santa Barbara, California : ABC-CLIO, [2015] 9781610694438 (DLC) 2014038753 (OCoLC)881439869 Contemporary world issues. http://id.loc.gov/authorities/names/n86726709 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=955572 Volltext |
spellingShingle | Springer, Paul J. Cyber warfare : a reference handbook / Contemporary world issues. Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology. Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberspace Security measures History. Cyberterrorism Prevention. Computer crimes Prevention. Cyberguerre (Science militaire) HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace Security measures fast Computer crimes Prevention fast Cyberspace operations (Military science) fast Cyberterrorism Prevention fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2013000988 |
title | Cyber warfare : a reference handbook / |
title_alt | Cyberwarfare, a reference handbook |
title_auth | Cyber warfare : a reference handbook / |
title_exact_search | Cyber warfare : a reference handbook / |
title_full | Cyber warfare : a reference handbook / Paul J. Springer. |
title_fullStr | Cyber warfare : a reference handbook / Paul J. Springer. |
title_full_unstemmed | Cyber warfare : a reference handbook / Paul J. Springer. |
title_short | Cyber warfare : |
title_sort | cyber warfare a reference handbook |
title_sub | a reference handbook / |
topic | Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberspace Security measures History. Cyberterrorism Prevention. Computer crimes Prevention. Cyberguerre (Science militaire) HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace Security measures fast Computer crimes Prevention fast Cyberspace operations (Military science) fast Cyberterrorism Prevention fast |
topic_facet | Cyberspace operations (Military science) Cyberspace Security measures History. Cyberterrorism Prevention. Computer crimes Prevention. Cyberguerre (Science militaire) HISTORY Military Other. TECHNOLOGY & ENGINEERING Military Science. Cyberspace Security measures Computer crimes Prevention Cyberterrorism Prevention History |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=955572 |
work_keys_str_mv | AT springerpaulj cyberwarfareareferencehandbook |