Encyclopedia of cyber warfare /:
"This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source,...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Barbara, California :
ABC-CLIO,
[2017]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source, unclassified data. Not only are the sources more readily available, but they tend to be more applicable to the target audience for this work. The authors come from a wide variety of backgrounds, with a substantial number of them serving in the military or other governmental institutions. As such, it needs to be stated that the ideas and arguments presented in this volume are the opinions of the individual authors, based upon their expertise, and do not represent the position of any government, military entity, or institution."--Provided by publisher. |
Beschreibung: | 1 online resource (xx, 379 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781440844256 1440844259 9798216070528 |
Internformat
MARC
LEADER | 00000cam a22000008i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1286473744 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 170117s2017 cau obe 001 0 eng | ||
010 | |a 2017002115 | ||
040 | |a DLC |b eng |e rda |c DLC |d N$T |d OCLCF |d IDEBK |d YDX |d EBLCP |d CSAIL |d NRC |d UPM |d TEFOD |d GGVRL |d MERUC |d NBT |d IUL |d WAU |d ORZ |d TEU |d WYU |d CGN |d UKAHL |d NJT |d IAI |d CES |d FTB |d OCLCO |d SHC |d OCLCQ |d DGW |d UKMGB |d BLOOM |d OCLCO |d OCLCL | ||
015 | |a GBC3D0423 |2 bnb | ||
016 | 7 | |a 021122969 |2 Uk | |
019 | |a 969204515 |a 990337316 |a 991113058 |a 1029315960 |a 1097141825 |a 1300550282 |a 1329667676 | ||
020 | |a 9781440844256 |q electronic book | ||
020 | |a 1440844259 |q electronic book | ||
020 | |z 9781440844249 |q hardcopy |q alkaline paper | ||
020 | |z 1440844240 |q hardcover |q alkaline paper | ||
020 | |a 9798216070528 |q Electronic book (EPUB format) | ||
035 | |a (OCoLC)1286473744 |z (OCoLC)969204515 |z (OCoLC)990337316 |z (OCoLC)991113058 |z (OCoLC)1029315960 |z (OCoLC)1097141825 |z (OCoLC)1300550282 |z (OCoLC)1329667676 | ||
037 | |a BC2E146E-AB3D-4393-9B66-8ED1EC95BD50 |b OverDrive, Inc. |n http://www.overdrive.com | ||
042 | |a pcc | ||
043 | |a n-us--- | ||
050 | 1 | 0 | |a U163 |b .E53 2017 |
072 | 7 | |a HIS |x 027130 |2 bisacsh | |
072 | 7 | |a TEC |x 025000 |2 bisacsh | |
082 | 7 | |a 355.4/1 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Encyclopedia of cyber warfare / |c Paul J. Springer, editor. |
264 | 1 | |a Santa Barbara, California : |b ABC-CLIO, |c [2017] | |
300 | |a 1 online resource (xx, 379 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b n |2 rdamedia | ||
338 | |a online resource |b nc |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a "This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source, unclassified data. Not only are the sources more readily available, but they tend to be more applicable to the target audience for this work. The authors come from a wide variety of backgrounds, with a substantial number of them serving in the military or other governmental institutions. As such, it needs to be stated that the ideas and arguments presented in this volume are the opinions of the individual authors, based upon their expertise, and do not represent the position of any government, military entity, or institution."--Provided by publisher. | ||
588 | |a Description based on online resource; title from digital title page (viewed on December 21, 2021). | ||
505 | 0 | |a Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing | |
505 | 8 | |a Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA) | |
505 | 8 | |a Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker | |
505 | 8 | |a HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L | |
505 | 8 | |a Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST) | |
650 | 0 | |a Cyberspace operations (Military science) |z United States |v Encyclopedias. | |
650 | 0 | |a Cyberterrorism |v Encyclopedias. | |
650 | 6 | |a Cyberguerre (Science militaire) |z États-Unis |v Encyclopédies. | |
650 | 6 | |a Cyberterrorisme |v Encyclopédies. | |
650 | 7 | |a Politics & government. |2 bicssc | |
650 | 7 | |a HISTORY |x Military |x Other. |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Military Science. |2 bisacsh | |
650 | 7 | |a Cyberspace operations (Military science) |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
651 | 7 | |a United States |2 fast | |
655 | 7 | |a Encyclopedias |2 fast | |
700 | 1 | |a Springer, Paul J., |e editor. | |
758 | |i has work: |a Encyclopedia of cyber warfare (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG3k9tDQPgKmB4FYChrJcP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Encyclopedia of cyber warfare |d ABC-CLIO, LLC : Santa Barbara, CA, [2017] |z 9781440844249 |w (DLC) 2016058373 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1538359 |3 Volltext |
938 | |a YBP Library Services |b YANK |n 20345486 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH32307254 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4883012 | ||
938 | |a EBSCOhost |b EBSC |n 1538359 | ||
938 | |a Gale Cengage Learning |b GVRL |n GVRL7JKI | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis38394370 | ||
938 | |a YBP Library Services |b YANK |n 14643235 | ||
938 | |a Bloomsbury Publishing |b BLOO |n BP9798400636462BC | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1286473744 |
---|---|
_version_ | 1816882553051676672 |
adam_text | |
any_adam_object | |
author2 | Springer, Paul J. |
author2_role | edt |
author2_variant | p j s pj pjs |
author_facet | Springer, Paul J. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 .E53 2017 |
callnumber-search | U163 .E53 2017 |
callnumber-sort | U 3163 E53 42017 |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA) Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST) |
ctrlnum | (OCoLC)1286473744 |
dewey-full | 355.4/1 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4/1 |
dewey-search | 355.4/1 |
dewey-sort | 3355.4 11 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07261cam a22007818i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1286473744</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">170117s2017 cau obe 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2017002115</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">DLC</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">IDEBK</subfield><subfield code="d">YDX</subfield><subfield code="d">EBLCP</subfield><subfield code="d">CSAIL</subfield><subfield code="d">NRC</subfield><subfield code="d">UPM</subfield><subfield code="d">TEFOD</subfield><subfield code="d">GGVRL</subfield><subfield code="d">MERUC</subfield><subfield code="d">NBT</subfield><subfield code="d">IUL</subfield><subfield code="d">WAU</subfield><subfield code="d">ORZ</subfield><subfield code="d">TEU</subfield><subfield code="d">WYU</subfield><subfield code="d">CGN</subfield><subfield code="d">UKAHL</subfield><subfield code="d">NJT</subfield><subfield code="d">IAI</subfield><subfield code="d">CES</subfield><subfield code="d">FTB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SHC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DGW</subfield><subfield code="d">UKMGB</subfield><subfield code="d">BLOOM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC3D0423</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">021122969</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">969204515</subfield><subfield code="a">990337316</subfield><subfield code="a">991113058</subfield><subfield code="a">1029315960</subfield><subfield code="a">1097141825</subfield><subfield code="a">1300550282</subfield><subfield code="a">1329667676</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781440844256</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1440844259</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781440844249</subfield><subfield code="q">hardcopy</subfield><subfield code="q">alkaline paper</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1440844240</subfield><subfield code="q">hardcover</subfield><subfield code="q">alkaline paper</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798216070528</subfield><subfield code="q">Electronic book (EPUB format)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1286473744</subfield><subfield code="z">(OCoLC)969204515</subfield><subfield code="z">(OCoLC)990337316</subfield><subfield code="z">(OCoLC)991113058</subfield><subfield code="z">(OCoLC)1029315960</subfield><subfield code="z">(OCoLC)1097141825</subfield><subfield code="z">(OCoLC)1300550282</subfield><subfield code="z">(OCoLC)1329667676</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">BC2E146E-AB3D-4393-9B66-8ED1EC95BD50</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1="1" ind2="0"><subfield code="a">U163</subfield><subfield code="b">.E53 2017</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027130</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">025000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355.4/1</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Encyclopedia of cyber warfare /</subfield><subfield code="c">Paul J. Springer, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Barbara, California :</subfield><subfield code="b">ABC-CLIO,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 379 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source, unclassified data. Not only are the sources more readily available, but they tend to be more applicable to the target audience for this work. The authors come from a wide variety of backgrounds, with a substantial number of them serving in the military or other governmental institutions. As such, it needs to be stated that the ideas and arguments presented in this volume are the opinions of the individual authors, based upon their expertise, and do not represent the position of any government, military entity, or institution."--Provided by publisher.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on December 21, 2021).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="z">United States</subfield><subfield code="v">Encyclopedias.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="v">Encyclopedias.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberguerre (Science militaire)</subfield><subfield code="z">États-Unis</subfield><subfield code="v">Encyclopédies.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme</subfield><subfield code="v">Encyclopédies.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Politics & government.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY</subfield><subfield code="x">Military</subfield><subfield code="x">Other.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Military Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Encyclopedias</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Springer, Paul J.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Encyclopedia of cyber warfare (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG3k9tDQPgKmB4FYChrJcP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Encyclopedia of cyber warfare</subfield><subfield code="d">ABC-CLIO, LLC : Santa Barbara, CA, [2017]</subfield><subfield code="z">9781440844249</subfield><subfield code="w">(DLC) 2016058373</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1538359</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">20345486</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH32307254</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4883012</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1538359</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Gale Cengage Learning</subfield><subfield code="b">GVRL</subfield><subfield code="n">GVRL7JKI</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis38394370</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14643235</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Bloomsbury Publishing</subfield><subfield code="b">BLOO</subfield><subfield code="n">BP9798400636462BC</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Encyclopedias fast |
genre_facet | Encyclopedias |
geographic | United States fast |
geographic_facet | United States |
id | ZDB-4-EBA-on1286473744 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:26Z |
institution | BVB |
isbn | 9781440844256 1440844259 9798216070528 |
language | English |
lccn | 2017002115 |
oclc_num | 1286473744 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xx, 379 pages) |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | ABC-CLIO, |
record_format | marc |
spelling | Encyclopedia of cyber warfare / Paul J. Springer, editor. Santa Barbara, California : ABC-CLIO, [2017] 1 online resource (xx, 379 pages) text txt rdacontent computer n rdamedia online resource nc rdacarrier Includes bibliographical references and index. "This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source, unclassified data. Not only are the sources more readily available, but they tend to be more applicable to the target audience for this work. The authors come from a wide variety of backgrounds, with a substantial number of them serving in the military or other governmental institutions. As such, it needs to be stated that the ideas and arguments presented in this volume are the opinions of the individual authors, based upon their expertise, and do not represent the position of any government, military entity, or institution."--Provided by publisher. Description based on online resource; title from digital title page (viewed on December 21, 2021). Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA) Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST) Cyberspace operations (Military science) United States Encyclopedias. Cyberterrorism Encyclopedias. Cyberguerre (Science militaire) États-Unis Encyclopédies. Cyberterrorisme Encyclopédies. Politics & government. bicssc HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace operations (Military science) fast Cyberterrorism fast United States fast Encyclopedias fast Springer, Paul J., editor. has work: Encyclopedia of cyber warfare (Text) https://id.oclc.org/worldcat/entity/E39PCG3k9tDQPgKmB4FYChrJcP https://id.oclc.org/worldcat/ontology/hasWork Print version: Encyclopedia of cyber warfare ABC-CLIO, LLC : Santa Barbara, CA, [2017] 9781440844249 (DLC) 2016058373 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1538359 Volltext |
spellingShingle | Encyclopedia of cyber warfare / Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA) Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST) Cyberspace operations (Military science) United States Encyclopedias. Cyberterrorism Encyclopedias. Cyberguerre (Science militaire) États-Unis Encyclopédies. Cyberterrorisme Encyclopédies. Politics & government. bicssc HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace operations (Military science) fast Cyberterrorism fast |
title | Encyclopedia of cyber warfare / |
title_auth | Encyclopedia of cyber warfare / |
title_exact_search | Encyclopedia of cyber warfare / |
title_full | Encyclopedia of cyber warfare / Paul J. Springer, editor. |
title_fullStr | Encyclopedia of cyber warfare / Paul J. Springer, editor. |
title_full_unstemmed | Encyclopedia of cyber warfare / Paul J. Springer, editor. |
title_short | Encyclopedia of cyber warfare / |
title_sort | encyclopedia of cyber warfare |
topic | Cyberspace operations (Military science) United States Encyclopedias. Cyberterrorism Encyclopedias. Cyberguerre (Science militaire) États-Unis Encyclopédies. Cyberterrorisme Encyclopédies. Politics & government. bicssc HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Cyberspace operations (Military science) fast Cyberterrorism fast |
topic_facet | Cyberspace operations (Military science) United States Encyclopedias. Cyberterrorism Encyclopedias. Cyberguerre (Science militaire) États-Unis Encyclopédies. Cyberterrorisme Encyclopédies. Politics & government. HISTORY Military Other. TECHNOLOGY & ENGINEERING Military Science. Cyberspace operations (Military science) Cyberterrorism United States Encyclopedias |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1538359 |
work_keys_str_mv | AT springerpaulj encyclopediaofcyberwarfare |