|
|
|
|
LEADER |
00000cam a2200000M 4500 |
001 |
EBOOKCENTRAL_on1007927550 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
171031s2015 xx o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e pn
|c YDX
|d N$T
|d OCLCF
|d OCLCA
|d SNK
|d DKU
|d AUW
|d IGB
|d D6H
|d EBLCP
|d OCLCQ
|d VTS
|d AGLDB
|d G3B
|d S8J
|d S9I
|d STF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1264807259
|
020 |
|
|
|a 8021078707
|q (electronic bk.)
|
020 |
|
|
|a 9788021078703
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000075612362
|
035 |
|
|
|a (OCoLC)1007927550
|z (OCoLC)1264807259
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a JAKUB DRMOLA.
|
245 |
1 |
0 |
|a PERSPECTIVES ON CYBERSECURITY.
|
260 |
|
|
|a [Place of publication not identified] :
|b MASARYKOVA UNIVERZITA.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Intro -- Foreword -- Table of Contents -- Summary -- Cyberscepticism: Arguments Against Cyberwar -- Introduction -- Aims and Methodology -- Existing Concepts, Clashing Attitudes -- The First Concepts of Cyberwar -- The Alarmists and the Sceptics: Where Does the Truth Lie? -- A Rejected Notion -- An Improbable Cyberwar: The Sceptical Standpoint -- Conclusion -- Cyberdeterrence -- Introduction -- Cyber and Deterrence "Theory" -- Cyberspace Theory -- Theory of Deterrence -- Cyberdeterrence -- Possibilities for Using Cyberdeterrence -- Concept of Cyberdeterrence
|
505 |
8 |
|
|a Can Cyberdeterrence be Effective? -- Conclusion -- Principle of Distinction in Cyber Warfare -- Introduction -- Law and Its Purpose -- Applying Distinction to Cyberspace -- The system as a legitimate military objective and excessive damage -- An IT expert as a direct participant in hostilities -- Conclusion -- The Phenomenon of Advanced Persistent Threat: Identification of Criteria in New Cases -- Introduction -- Previous Research -- APT -- Why APT? -- Criteria -- Resources -- Targets -- Intentions -- Skills and Experience -- Persistence -- Behaviour pattern -- APT Not State-sponsored?
|
505 |
8 |
|
|a Anatomy of Attack -- Preparation -- Initial Intrusion -- Expansion -- Exfiltration -- Previous Cases -- New Cases -- Red October -- Careto -- Gauss -- Icefog -- Turla -- Kimsuky -- Summary -- Conclusion -- Chinese Telecommunications Companies as a Threat to Critical Infrastructure: The Case of Huawei -- Introduction -- Huawei's History and Profile -- Assessment of Huawei as a Threat -- Character of Possible Risks Toward Critical Infrastructure Definition -- Huawei's Current Status -- Huawei's Strategy -- Conclusion -- Regional Cyber Security Cooperation Regimes: Opportunities and Challenges
|
505 |
8 |
|
|a Introduction -- Importance of Regionalism for Cybersecurity -- Security dilemma: The dynamics in cyberspace -- Security Dilemma: The Strategic ambiguity -- Interpretation of capabilities -- Response -- On norms -- The conditions for the emergence of norms -- Benefits and Challenges of Regionalism for Reducing the Security Dilemma -- Obstacles to cooperation -- Major Concerns for Normative Regional Cooperation -- Cybersecurity Measures in Regional Organizations -- The Shanghai Cooperation Organization -- The Asia-Pacific Economic Cooperation -- The Association of Southeast Asian Nations
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
758 |
|
|
|i has work:
|a PERSPECTIVES ON CYBERSECURITY (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCXptMwp3pGGyQYTQRW3Bk8
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6421689
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6421689
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5320650
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1606007
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14932770
|
994 |
|
|
|a 92
|b IZTAP
|