|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn846492852 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130603s2013 ne ob 001 0 eng d |
010 |
|
|
|z 2013014772
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OPELS
|d VRC
|d E7B
|d ITS
|d YDXCP
|d OCLCA
|d NOC
|d UPM
|d TEFOD
|d COO
|d TEFOD
|d DEBSZ
|d UAB
|d TPH
|d DKDLA
|d UKDOC
|d OCLCQ
|d TEFOD
|d OCLCQ
|d D6H
|d LOA
|d ICA
|d LVT
|d AGLDB
|d K6U
|d PIFAG
|d FVL
|d ZCU
|d MERUC
|d SAV
|d OCLCQ
|d JBG
|d U3W
|d OCLCF
|d STF
|d TAMCT
|d WRM
|d OCLCQ
|d VTS
|d LND
|d ICG
|d OCLCQ
|d OTZ
|d A6Q
|d LEAUB
|d DKC
|d OCLCQ
|d HS0
|d UKCRE
|d AJS
|d S2H
|d OCLCO
|d OCLCA
|d OCLCQ
|d OCL
|d QGK
|d OCLCO
|d OCLCQ
|d INARC
|d OCLCO
|
019 |
|
|
|a 852787563
|a 962189031
|a 972037653
|a 992031992
|a 1037689577
|a 1038589886
|a 1083556988
|a 1109195164
|a 1153560285
|a 1162053077
|a 1241795785
|
020 |
|
|
|a 9780124079267
|q (electronic bk.)
|
020 |
|
|
|a 0124079261
|q (electronic bk.)
|
020 |
|
|
|z 9780124078147
|
020 |
|
|
|z 0124078141
|
029 |
1 |
|
|a AU@
|b 000051860338
|
029 |
1 |
|
|a AU@
|b 000059642826
|
029 |
1 |
|
|a CHNEW
|b 001011208
|
029 |
1 |
|
|a CHVBK
|b 519285824
|
029 |
1 |
|
|a DEBBG
|b BV042314326
|
029 |
1 |
|
|a DEBBG
|b BV044172453
|
029 |
1 |
|
|a DEBSZ
|b 405348878
|
029 |
1 |
|
|a DEBSZ
|b 431307725
|
029 |
1 |
|
|a DEBSZ
|b 481273379
|
029 |
1 |
|
|a NZ1
|b 15193693
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999942322305765
|
035 |
|
|
|a (OCoLC)846492852
|z (OCoLC)852787563
|z (OCoLC)962189031
|z (OCoLC)972037653
|z (OCoLC)992031992
|z (OCoLC)1037689577
|z (OCoLC)1038589886
|z (OCoLC)1083556988
|z (OCoLC)1109195164
|z (OCoLC)1153560285
|z (OCoLC)1162053077
|z (OCoLC)1241795785
|
037 |
|
|
|a 6B1C4816-25DC-48EA-8BE9-0978992555FB
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a U163
|b .S438 2013eb
|
072 |
|
7 |
|a HIS
|x 027060
|2 bisacsh
|
082 |
0 |
4 |
|a 355.4
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Shakarian, Paulo.
|
245 |
1 |
0 |
|a Introduction to cyber-warfare :
|b a multidisciplinary approach /
|c Paulo Shakarian, Jana Shakarian & Andrew Ruef.
|
260 |
|
|
|a Amsterdam [Netherlands] :
|b Morgan Kaufmann Publishers, an imprint of Elsevier,
|c [2013]
|
300 |
|
|
|a 1 online resource (xvii, 318 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent.
|
505 |
0 |
|
|a 1. Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I. Cyber Attack -- 2. Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3. How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II. Cyber Espionage And Exploitation -- 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- Commonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9. Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10. How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III. Cyber Operations For Infrastructure Attack -- 11. Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13. Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future -- Summary -- Suggested Further Reading -- Conclusion and the Future of Cyber-Warfare.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Information warfare
|v Case studies.
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Guerre de l'information
|v Études de cas.
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a HISTORY
|x Military
|x Strategy.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information warfare
|2 fast
|
655 |
|
7 |
|a Case studies
|2 fast
|
655 |
|
7 |
|a Case studies.
|2 lcgft
|
655 |
|
7 |
|a Études de cas.
|2 rvmgf
|
700 |
1 |
|
|a Shakarian, Jana.
|
700 |
1 |
|
|a Ruef, Andrew.
|
776 |
0 |
8 |
|i Print version:
|a Shakarian, Paulo.
|t Introduction to cyber-warfare.
|d Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013]
|z 9780124078147
|w (DLC) 2013014772
|w (OCoLC)843025546
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1115159
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n introductiontocy00unse
|
938 |
|
|
|a 123Library
|b 123L
|n 101429
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10704774
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 503590
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10735319
|
994 |
|
|
|a 92
|b IZTAP
|