Cyber Warfare: A Reference Handbook: Contemporary World Issues
Autor Paul J. Springeren Limba Engleză Hardback – 24 feb 2015
Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat-from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats.
This essential reference-the only of its kind to include an overview of other cyber warfare literature-emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Hardback (1) | 236.94 lei 6-8 săpt. | |
| Bloomsbury Publishing – 24 feb 2015 | 236.94 lei 6-8 săpt. | |
| Hardback (1) | 484.28 lei 6-8 săpt. | |
| Bloomsbury Publishing – 8 iul 2020 | 484.28 lei 6-8 săpt. | |
| Hardback (1) | 283.33 lei 3-5 săpt. | +0.00 lei 6-12 zile |
| Bloomsbury Publishing – 25 iul 2024 | 283.33 lei 3-5 săpt. | +0.00 lei 6-12 zile |
Din seria Contemporary World Issues
-
Preț: 110.47 lei - 45%
Preț: 284.37 lei - 31%
Preț: 357.36 lei - nou
Preț: 358.24 lei - 43%
Preț: 283.98 lei - 45%
Preț: 282.65 lei - nou
Preț: 354.94 lei - 45%
Preț: 283.33 lei - 45%
Preț: 283.52 lei - 45%
Preț: 283.04 lei - 45%
Preț: 283.93 lei - 50%
Preț: 257.88 lei - nou
Preț: 358.24 lei - nou
Preț: 354.94 lei - 45%
Preț: 283.09 lei - 50%
Preț: 283.63 lei - nou
Preț: 152.51 lei - 31%
Preț: 358.23 lei - 31%
Preț: 357.11 lei - 31%
Preț: 357.45 lei -
Preț: 110.03 lei - 45%
Preț: 283.95 lei - 45%
Preț: 282.27 lei -
Preț: 285.67 lei - 45%
Preț: 282.74 lei - 49%
Preț: 289.10 lei - 45%
Preț: 257.88 lei - 45%
Preț: 284.46 lei - 44%
Preț: 236.17 lei - 50%
Preț: 260.33 lei - 45%
Preț: 285.06 lei - 45%
Preț: 258.50 lei - 45%
Preț: 284.46 lei - 55%
Preț: 236.17 lei - 55%
Preț: 233.73 lei - 44%
Preț: 236.79 lei - 45%
Preț: 285.67 lei - 45%
Preț: 258.50 lei - 45%
Preț: 298.95 lei -
Preț: 283.24 lei - 45%
Preț: 234.35 lei - 45%
Preț: 284.46 lei - 45%
Preț: 285.06 lei - 45%
Preț: 257.88 lei - 55%
Preț: 235.55 lei - 48%
Preț: 298.95 lei
Preț: 236.94 lei
Preț vechi: 522.50 lei
-55%
Puncte Express: 355
Preț estimativ în valută:
41.93€ • 49.01$ • 36.41£
41.93€ • 49.01$ • 36.41£
Carte tipărită la comandă
Livrare economică 20 februarie-06 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781610694438
ISBN-10: 1610694430
Pagini: 360
Ilustrații: 7 bw illus
Dimensiuni: 150 x 236 x 26 mm
Greutate: 0.66 kg
Editura: Bloomsbury Publishing
Colecția ABC-CLIO
Seria Contemporary World Issues
Locul publicării:New York, United States
ISBN-10: 1610694430
Pagini: 360
Ilustrații: 7 bw illus
Dimensiuni: 150 x 236 x 26 mm
Greutate: 0.66 kg
Editura: Bloomsbury Publishing
Colecția ABC-CLIO
Seria Contemporary World Issues
Locul publicării:New York, United States
Recenzii
This informative volume is a worthwhile addition to reference collections of high school, academic, and public libraries.
A valuable addition to the reference collection of academic libraries, especially those with a military history program.
Recommended. Lower-level undergraduates and above; general readers.
A valuable addition to the reference collection of academic libraries, especially those with a military history program.
Recommended. Lower-level undergraduates and above; general readers.
Cuprins
Preface
1. Background and History
Information as a Tool of War
The Role of Communications in Modern Warfare
Early Attempts at Encryption
Direct Observation Techniques
The Creation of Cyberspace
The Cyber Attacks Begin
Cyber Enabling in the Nuclear Middle East
Preparation for Infrastructure Cyber Attacks
Russian Hacktivists and National Pride
The Chinese Approach to Irregular Warfare
Non-State Actors and Cyber War
Ukraine and the Digital Conflict
The Current State of Cyber War
References
2. Problems, Controversies, and Solutions
Is a Cyber War Possible?
Cyber as a Military Domain
Cyber Strategy
Instruments of National Power
Cyber Crime, Cyber Espionage, and Cyberterrorism
The Problem of Attribution
The Dangers of Escalation
People and Paranoia
Cyber Ethics
Funding Conflict Through the Cyber Domain
References
3. Perspectives
The DoD Information System Network as a Weapon System, Mary E. Braun
The Challenges of Protecting Academia, Kurt Peifer
Ransomware and the Private Sector, Christopher R. Boom
Waging e-Jihad, Heidi Dexter
Cyber Warfare in the Professional Military Education System, S. Michael Pavelec
4. Profiles
Alexander, Keith B.
Anonymous
CrowdStrike
Defense Advanced Research Projects Agency
Defense Information Systems Agency (U.S.)
Equation Group
Fancy Bear (Russian Hacking Group)
FireEye, Inc.
Google, Inc.
Government Communications Headquarters (GCHQ, United Kingdom)
Hayden, Michael
Kaspersky, Yevgeniy "Eugene" Valentinovich
Lazarus Group (DPRK Hacking Group)Lehel, Marcel Lazar ("Guccifer")
Libicki, Martin
Mandiant
McAfee, Inc.
Microsoft Corporation
Mitnick, Kevin
Nakasone, Paul M.
National Security Agency (U.S.)
NATO Cooperative Cyber Defence Centre of Excellence
People's Liberation Army Unit 61398 (PRC)
Qiao Liang and Wang Xiangsui
RAND Corporation
Rogers, Michael S.
Russian Business Network
Shadow Brokers, The (Hacking Group)
Snowden, Edward
Stuxnet
Symantec Corporation
Syrian Electronic Army
Turing, Alan
U.S. Cyber Command
WikiLeaks
References
5. Documents
Tallinn Manual on the International Law Applicable to Cyber Warfare (2010)
Michael Rogers, "Testimony before the U.S. House Intelligence Committee" (2014)
People's Republic of China National Cyberspace Security Strategy (2016)
Assessing Russian Activities and Intentions in Recent U.S. Elections (2017)
Military and Security Developments Involving the Democratic People's Republic of Korea (2017)
Glenn S. Gerstell, "How We Need to Prepare for a Global Cyber Pandemic" (2018)
National Cyber Strategy of the United States (2018)
Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2018)
Department of Homeland Security Cybersecurity Strategy (2021)
Cybersecurity & Infrastructure Security Agency, "Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure" (2022)
6. Resources
Print Resources
Nonprint Resources
7. Chronology
Glossary
Index
About the Author
1. Background and History
Information as a Tool of War
The Role of Communications in Modern Warfare
Early Attempts at Encryption
Direct Observation Techniques
The Creation of Cyberspace
The Cyber Attacks Begin
Cyber Enabling in the Nuclear Middle East
Preparation for Infrastructure Cyber Attacks
Russian Hacktivists and National Pride
The Chinese Approach to Irregular Warfare
Non-State Actors and Cyber War
Ukraine and the Digital Conflict
The Current State of Cyber War
References
2. Problems, Controversies, and Solutions
Is a Cyber War Possible?
Cyber as a Military Domain
Cyber Strategy
Instruments of National Power
Cyber Crime, Cyber Espionage, and Cyberterrorism
The Problem of Attribution
The Dangers of Escalation
People and Paranoia
Cyber Ethics
Funding Conflict Through the Cyber Domain
References
3. Perspectives
The DoD Information System Network as a Weapon System, Mary E. Braun
The Challenges of Protecting Academia, Kurt Peifer
Ransomware and the Private Sector, Christopher R. Boom
Waging e-Jihad, Heidi Dexter
Cyber Warfare in the Professional Military Education System, S. Michael Pavelec
4. Profiles
Alexander, Keith B.
Anonymous
CrowdStrike
Defense Advanced Research Projects Agency
Defense Information Systems Agency (U.S.)
Equation Group
Fancy Bear (Russian Hacking Group)
FireEye, Inc.
Google, Inc.
Government Communications Headquarters (GCHQ, United Kingdom)
Hayden, Michael
Kaspersky, Yevgeniy "Eugene" Valentinovich
Lazarus Group (DPRK Hacking Group)Lehel, Marcel Lazar ("Guccifer")
Libicki, Martin
Mandiant
McAfee, Inc.
Microsoft Corporation
Mitnick, Kevin
Nakasone, Paul M.
National Security Agency (U.S.)
NATO Cooperative Cyber Defence Centre of Excellence
People's Liberation Army Unit 61398 (PRC)
Qiao Liang and Wang Xiangsui
RAND Corporation
Rogers, Michael S.
Russian Business Network
Shadow Brokers, The (Hacking Group)
Snowden, Edward
Stuxnet
Symantec Corporation
Syrian Electronic Army
Turing, Alan
U.S. Cyber Command
WikiLeaks
References
5. Documents
Tallinn Manual on the International Law Applicable to Cyber Warfare (2010)
Michael Rogers, "Testimony before the U.S. House Intelligence Committee" (2014)
People's Republic of China National Cyberspace Security Strategy (2016)
Assessing Russian Activities and Intentions in Recent U.S. Elections (2017)
Military and Security Developments Involving the Democratic People's Republic of Korea (2017)
Glenn S. Gerstell, "How We Need to Prepare for a Global Cyber Pandemic" (2018)
National Cyber Strategy of the United States (2018)
Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2018)
Department of Homeland Security Cybersecurity Strategy (2021)
Cybersecurity & Infrastructure Security Agency, "Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure" (2022)
6. Resources
Print Resources
Nonprint Resources
7. Chronology
Glossary
Index
About the Author