Russian cyber operations :: coding the boundaries of conflict /
"Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines th...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Washington, DC :
Georgetown University Press,
[2020]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- |
Beschreibung: | 1 online resource (xvi, 214 pages) : illustrations, maps |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1626167990 9781626167995 1626167974 9781626167971 1626167982 9781626167988 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1119747163 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 190829s2020 dcuab ob 001 0 eng | ||
010 | |a 2019038781 | ||
040 | |a DLC |b eng |e rda |c DLC |d OCLCO |d OCLCF |d OCLCQ |d YDX |d P@U |d EBLCP |d YDX |d N$T |d JSTOR |d COO |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 1165398055 | ||
020 | |a 1626167990 |q electronic book | ||
020 | |a 9781626167995 |q (electronic bk.) | ||
020 | |z 9781626167971 |q hardcover | ||
020 | |z 9781626167988 |q paperback | ||
020 | |a 1626167974 | ||
020 | |a 9781626167971 | ||
020 | |a 1626167982 | ||
020 | |a 9781626167988 | ||
035 | |a (OCoLC)1119747163 |z (OCoLC)1165398055 | ||
037 | |a 22573/ctv116f8gc |b JSTOR | ||
042 | |a pcc | ||
043 | |a e-ru--- |a n-us--- | ||
050 | 0 | 4 | |a U167.5.C92 |b J375 2020 |
072 | 7 | |a POL |x 012000 |2 bisacsh | |
072 | 7 | |a POL |x 060000 |2 bisacsh | |
082 | 7 | |a 355.4/1 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Jasper, Scott, |e author. |0 http://id.loc.gov/authorities/names/n2008078486 | |
245 | 1 | 0 | |a Russian cyber operations : |b coding the boundaries of conflict / |c Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.). |
264 | 1 | |a Washington, DC : |b Georgetown University Press, |c [2020] | |
300 | |a 1 online resource (xvi, 214 pages) : |b illustrations, maps | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion. | |
520 | |a "Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- |c Provided by publisher. | ||
588 | |a Description based on online resource; title from digital title page (viewed on May 19, 2020). | ||
650 | 0 | |a Cyberspace operations (Military science) |z Russia (Federation) | |
650 | 0 | |a Information warfare |z Russia (Federation) | |
650 | 0 | |a Hybrid warfare |z Russia (Federation) | |
650 | 0 | |a Asymmetric warfare |z Russia (Federation) | |
650 | 0 | |a Cyber intelligence (Computer security) |z United States. | |
650 | 0 | |a Computer security |z United States. | |
650 | 6 | |a Cyberguerre (Science militaire) |z Russie. | |
650 | 6 | |a Guerre de l'information |z Russie. | |
650 | 6 | |a Guerre hybride |z Russie. | |
650 | 6 | |a Guerre asymétrique |z Russie. | |
650 | 6 | |a Surveillance des menaces informatiques |z États-Unis. | |
650 | 6 | |a Sécurité informatique |z États-Unis. | |
650 | 7 | |a POLITICAL SCIENCE / Security (National & International) |2 bisacsh | |
650 | 7 | |a Asymmetric warfare |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyber intelligence (Computer security) |2 fast | |
650 | 7 | |a Cyberspace operations (Military science) |2 fast | |
650 | 7 | |a Hybrid warfare |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
651 | 7 | |a Russia (Federation) |2 fast | |
651 | 7 | |a United States |2 fast | |
776 | 0 | 8 | |i Print version: |a Jasper, Scott. |t Russian cyber operations |d Washington, DC : Georgetown University Press, 2020. |z 9781626167971 |w (DLC) 2019038780 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2469428 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6192048 | ||
938 | |a Project MUSE |b MUSE |n muse86123 | ||
938 | |a YBP Library Services |b YANK |n 16761012 | ||
938 | |a EBSCOhost |b EBSC |n 2469428 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1119747163 |
---|---|
_version_ | 1816882500916477952 |
adam_text | |
any_adam_object | |
author | Jasper, Scott |
author_GND | http://id.loc.gov/authorities/names/n2008078486 |
author_facet | Jasper, Scott |
author_role | aut |
author_sort | Jasper, Scott |
author_variant | s j sj |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U167 |
callnumber-raw | U167.5.C92 J375 2020 |
callnumber-search | U167.5.C92 J375 2020 |
callnumber-sort | U 3167.5 C92 J375 42020 |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion. |
ctrlnum | (OCoLC)1119747163 |
dewey-full | 355.4/1 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4/1 |
dewey-search | 355.4/1 |
dewey-sort | 3355.4 11 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04840cam a2200805 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1119747163</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">190829s2020 dcuab ob 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2019038781</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">DLC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDX</subfield><subfield code="d">P@U</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">JSTOR</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1165398055</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626167990</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626167995</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781626167971</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781626167988</subfield><subfield code="q">paperback</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626167974</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626167971</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626167982</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626167988</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1119747163</subfield><subfield code="z">(OCoLC)1165398055</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctv116f8gc</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e-ru---</subfield><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1="0" ind2="4"><subfield code="a">U167.5.C92</subfield><subfield code="b">J375 2020</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">060000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355.4/1</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jasper, Scott,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2008078486</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Russian cyber operations :</subfield><subfield code="b">coding the boundaries of conflict /</subfield><subfield code="c">Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.).</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, DC :</subfield><subfield code="b">Georgetown University Press,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 214 pages) :</subfield><subfield code="b">illustrations, maps</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on May 19, 2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="z">Russia (Federation)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">Russia (Federation)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hybrid warfare</subfield><subfield code="z">Russia (Federation)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Asymmetric warfare</subfield><subfield code="z">Russia (Federation)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberguerre (Science militaire)</subfield><subfield code="z">Russie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre de l'information</subfield><subfield code="z">Russie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre hybride</subfield><subfield code="z">Russie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre asymétrique</subfield><subfield code="z">Russie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Surveillance des menaces informatiques</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National & International)</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Asymmetric warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hybrid warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Russia (Federation)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Jasper, Scott.</subfield><subfield code="t">Russian cyber operations</subfield><subfield code="d">Washington, DC : Georgetown University Press, 2020.</subfield><subfield code="z">9781626167971</subfield><subfield code="w">(DLC) 2019038780</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2469428</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6192048</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Project MUSE</subfield><subfield code="b">MUSE</subfield><subfield code="n">muse86123</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">16761012</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2469428</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | Russia (Federation) fast United States fast |
geographic_facet | Russia (Federation) United States |
id | ZDB-4-EBA-on1119747163 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:29:36Z |
institution | BVB |
isbn | 1626167990 9781626167995 1626167974 9781626167971 1626167982 9781626167988 |
language | English |
lccn | 2019038781 |
oclc_num | 1119747163 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 214 pages) : illustrations, maps |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Georgetown University Press, |
record_format | marc |
spelling | Jasper, Scott, author. http://id.loc.gov/authorities/names/n2008078486 Russian cyber operations : coding the boundaries of conflict / Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.). Washington, DC : Georgetown University Press, [2020] 1 online resource (xvi, 214 pages) : illustrations, maps text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion. "Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- Provided by publisher. Description based on online resource; title from digital title page (viewed on May 19, 2020). Cyberspace operations (Military science) Russia (Federation) Information warfare Russia (Federation) Hybrid warfare Russia (Federation) Asymmetric warfare Russia (Federation) Cyber intelligence (Computer security) United States. Computer security United States. Cyberguerre (Science militaire) Russie. Guerre de l'information Russie. Guerre hybride Russie. Guerre asymétrique Russie. Surveillance des menaces informatiques États-Unis. Sécurité informatique États-Unis. POLITICAL SCIENCE / Security (National & International) bisacsh Asymmetric warfare fast Computer security fast Cyber intelligence (Computer security) fast Cyberspace operations (Military science) fast Hybrid warfare fast Information warfare fast Russia (Federation) fast United States fast Print version: Jasper, Scott. Russian cyber operations Washington, DC : Georgetown University Press, 2020. 9781626167971 (DLC) 2019038780 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2469428 Volltext |
spellingShingle | Jasper, Scott Russian cyber operations : coding the boundaries of conflict / Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion. Cyberspace operations (Military science) Russia (Federation) Information warfare Russia (Federation) Hybrid warfare Russia (Federation) Asymmetric warfare Russia (Federation) Cyber intelligence (Computer security) United States. Computer security United States. Cyberguerre (Science militaire) Russie. Guerre de l'information Russie. Guerre hybride Russie. Guerre asymétrique Russie. Surveillance des menaces informatiques États-Unis. Sécurité informatique États-Unis. POLITICAL SCIENCE / Security (National & International) bisacsh Asymmetric warfare fast Computer security fast Cyber intelligence (Computer security) fast Cyberspace operations (Military science) fast Hybrid warfare fast Information warfare fast |
title | Russian cyber operations : coding the boundaries of conflict / |
title_auth | Russian cyber operations : coding the boundaries of conflict / |
title_exact_search | Russian cyber operations : coding the boundaries of conflict / |
title_full | Russian cyber operations : coding the boundaries of conflict / Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.). |
title_fullStr | Russian cyber operations : coding the boundaries of conflict / Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.). |
title_full_unstemmed | Russian cyber operations : coding the boundaries of conflict / Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.). |
title_short | Russian cyber operations : |
title_sort | russian cyber operations coding the boundaries of conflict |
title_sub | coding the boundaries of conflict / |
topic | Cyberspace operations (Military science) Russia (Federation) Information warfare Russia (Federation) Hybrid warfare Russia (Federation) Asymmetric warfare Russia (Federation) Cyber intelligence (Computer security) United States. Computer security United States. Cyberguerre (Science militaire) Russie. Guerre de l'information Russie. Guerre hybride Russie. Guerre asymétrique Russie. Surveillance des menaces informatiques États-Unis. Sécurité informatique États-Unis. POLITICAL SCIENCE / Security (National & International) bisacsh Asymmetric warfare fast Computer security fast Cyber intelligence (Computer security) fast Cyberspace operations (Military science) fast Hybrid warfare fast Information warfare fast |
topic_facet | Cyberspace operations (Military science) Russia (Federation) Information warfare Russia (Federation) Hybrid warfare Russia (Federation) Asymmetric warfare Russia (Federation) Cyber intelligence (Computer security) United States. Computer security United States. Cyberguerre (Science militaire) Russie. Guerre de l'information Russie. Guerre hybride Russie. Guerre asymétrique Russie. Surveillance des menaces informatiques États-Unis. Sécurité informatique États-Unis. POLITICAL SCIENCE / Security (National & International) Asymmetric warfare Computer security Cyber intelligence (Computer security) Cyberspace operations (Military science) Hybrid warfare Information warfare Russia (Federation) United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2469428 |
work_keys_str_mv | AT jasperscott russiancyberoperationscodingtheboundariesofconflict |