Cargando…

North Korea's cyber operations : strategy and responses /

North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Jun, Jenny (Autor), LaFoy, Scott (Autor), Sohn, Ethan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Washington, DC : Lanham, Maryland : Center for Strategic & International Studies ; Rowman & Littlefield, [2015]
Colección:CSIS report.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn934513975
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 160112t20152015dcu ob 000 0 eng d
010 |a  2021763875 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDXCP  |d N$T  |d DID  |d OCLCF  |d CDX  |d IDEBK  |d EBLCP  |d OCLCQ  |d OCLCA  |d TEFOD  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d DLC  |d OCLCO  |d OCLCL  |d TMA  |d OCLCQ 
019 |a 934743232  |a 934770943  |a 1351935506 
020 |a 9781442259034  |q (electronic bk.) 
020 |a 1442259035  |q (electronic bk.) 
020 |z 9781442259027 
020 |z 1442259027 
029 1 |a AU@  |b 000057046117 
029 1 |a CHNEW  |b 001073326 
029 1 |a CHVBK  |b 579461238 
029 1 |a NLGGC  |b 401615561 
035 |a (OCoLC)934513975  |z (OCoLC)934743232  |z (OCoLC)934770943  |z (OCoLC)1351935506 
037 |a 887224  |b MIL 
037 |a E8701D86-03C6-4715-8336-68A9DA396BED  |b OverDrive, Inc.  |n http://www.overdrive.com 
043 |a a-kn--- 
050 4 |a U163 
072 7 |a HIS  |x 027130  |2 bisacsh 
072 7 |a TEC  |x 025000  |2 bisacsh 
082 0 4 |a 355.4  |2 23 
049 |a UAMI 
100 1 |a Jun, Jenny,  |e author. 
245 1 0 |a North Korea's cyber operations :  |b strategy and responses /  |c authors, Jenny Jun, Scott LaFoy, Ethan Sohn ; project directors, Victor D. Cha, James A. Lewis. 
264 1 |a Washington, DC :  |b Center for Strategic & International Studies ;  |a Lanham, Maryland :  |b Rowman & Littlefield,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (VIII, 97 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a CSIS reports 
500 |a "A report of the CSIS Korea Chair." 
500 |a "December 2015." 
504 |a Includes bibliographical references (pages 80-93). 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed January 14, 2016). 
520 |a North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the topic. Existing research is fragmented in pockets of strategic, technical, and policy pieces, though no individual study reaches far enough to create a standard reference document about North Korea's cyber capabilities. This report aims to fill this void, integrating Korean and English language information sources, existing work in each respective field, and creating a foundation for future deeper research. 
505 0 |a Preface. -- Acknowledgments. -- Abbreviations. -- Introduction. -- Strategic context. -- Organization. -- Future trends and policy recommendations. -- Appendix. -- Bibliography. -- About the project directors and authors. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Cyberspace operations (Military science)  |z Korea (North) 
650 0 |a Cyberterrorism  |x Prevention. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Cyberguerre (Science militaire)  |z Corée du Nord. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a HISTORY  |x Military  |x Other.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Military Science.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Cyberspace operations (Military science)  |2 fast 
650 7 |a Cyberterrorism  |x Prevention  |2 fast 
651 7 |a Korea (North)  |2 fast  |1 https://id.oclc.org/worldcat/entity/E39QbtfRqdvrCY9mgGQBhg9Y4Y 
700 1 |a LaFoy, Scott,  |e author. 
700 1 |a Sohn, Ethan,  |e author. 
758 |i has work:  |a North Korea's cyber operations (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFDygdWxdd8RWtf4Q9Tkfy  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 1442259027  |z 9781442259027  |w (OCoLC)933437798 
830 0 |a CSIS report. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4332477  |z Texto completo 
938 |a Coutts Information Services  |b COUT  |n 33517224 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4332477 
938 |a EBSCOhost  |b EBSC  |n 1140413 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis33517224 
938 |a YBP Library Services  |b YANK  |n 12802145 
994 |a 92  |b IZTAP