Cargando…

The virtual battlefield : perspectives on cyber warfare /

"All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Czosseck, Christian, Geers, Kenneth
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Washington, DC : Ios Press, ©2009.
Colección:Cryptology and information security series ; v. 3.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn591152271
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 100401s2009 ne a ob 001 0 eng d
010 |a  2009937744 
040 |a IOSPR  |b eng  |e pn  |c IOSPR  |d EBLCP  |d N$T  |d YDXCP  |d IDEBK  |d IAL  |d E7B  |d GPM  |d OCLCQ  |d FVL  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d P4I  |d OCLCQ  |d DEBSZ  |d NLGGC  |d OCLCQ  |d LOA  |d JBG  |d AGLDB  |d MOR  |d PIFAG  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d KIJ  |d UUM  |d STF  |d WRM  |d VTS  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d WYU  |d OCLCQ  |d AUD  |d DKC  |d AU@  |d OCLCQ  |d M8D  |d OCLCQ  |d K6U  |d UKCRE  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 618891032  |a 647899377  |a 744953080  |a 748598784  |a 767253842  |a 816387617  |a 961522272  |a 962626032  |a 966206532  |a 988426906  |a 992058812  |a 1037930539  |a 1038589297  |a 1045519537  |a 1055399195  |a 1064785446  |a 1081246468  |a 1153482768  |a 1228569026 
020 |a 9781607505112 
020 |a 1607505118 
020 |a 1282600907 
020 |a 9781282600904 
020 |z 9781607500605  |q (hbk.) 
020 |z 1607500604  |q (hbk.) 
029 1 |a AU@  |b 000046125091 
029 1 |a AU@  |b 000051420937 
029 1 |a DEBBG  |b BV043116447 
029 1 |a DEBBG  |b BV044142837 
029 1 |a DEBSZ  |b 42188052X 
029 1 |a DEBSZ  |b 430837453 
029 1 |a NLGGC  |b 32715652X 
029 1 |a NZ1  |b 13648797 
035 |a (OCoLC)591152271  |z (OCoLC)618891032  |z (OCoLC)647899377  |z (OCoLC)744953080  |z (OCoLC)748598784  |z (OCoLC)767253842  |z (OCoLC)816387617  |z (OCoLC)961522272  |z (OCoLC)962626032  |z (OCoLC)966206532  |z (OCoLC)988426906  |z (OCoLC)992058812  |z (OCoLC)1037930539  |z (OCoLC)1038589297  |z (OCoLC)1045519537  |z (OCoLC)1055399195  |z (OCoLC)1064785446  |z (OCoLC)1081246468  |z (OCoLC)1153482768  |z (OCoLC)1228569026 
037 |a 978-1-60750-511-2  |b IOS Press  |n http://www.iospress.nl 
050 4 |a U163  |b .V578 2009eb 
072 7 |a COM  |x COM014000  |2 bisacsh 
072 7 |a JWX, UR  |2 bicssc 
082 0 4 |a 355.4  |2 22 
049 |a UAMI 
245 0 4 |a The virtual battlefield :  |b perspectives on cyber warfare /  |c edited by Christian Czosseck and Kenneth Geers. 
260 |a Amsterdam ;  |a Washington, DC :  |b Ios Press,  |c ©2009. 
300 |a 1 online resource (xx, 305 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cryptology and information security series ;  |v v. 3 
504 |a Includes bibliographical references and indexes. 
505 0 |a pt. 1. Strategic viewpoints. Cyber wars : a paradigm shift from means to ends / Amit Sharma -- Towards an evolving theory of cyberpower / Stuart H. Starr -- Sub rosa cyber war / Martin C. Libicki -- Warfare and the continuum of cyber risks : a policy perspective / Andrew Cutts -- Cyber terrorism : a new dimension in battlespace / J.P.I.A.G Charvat -- Borders in cyberspace : can sovereignty adapt to the challenges of cyber security? / Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. Rios -- Belarus in the context of European cyber security / Fyodor Pavlyuchenko -- Politically motivated denial of service attacks / Jose Nazario -- A brief examination of media coverage of cyberattacks (2007-present) / Cyrus Farivar. 
505 8 |a pt. 2. Technical challenges and solutions. Behavioral analysis of zombie armies / Olivier Thonnard, Wim Mees, Marc Dacier -- Proactive botnet countermeasures-an offensive approach / Felix Leder, Tillmann Werner, Peter Martini -- When not to pull the plug-the need for network counter-surveillance operations / Scott Knight, Sylvain Leblanc -- Autonomic computer network defence using risk state and reinforcement learning / Luc Beaudoin, Nathalie Japkowicz, Stan Matwin -- Enhancing graph-based automated DoS attack response / Gabriel Klein [and others] -- On nth order attacks / Daniel Bilar -- Business and social evaluation of denial of service attacks in view of scaling economic counter-measures / Louis-Francois Pau -- Virtual plots, real revolution / Roelof Temmingh, Kenneth Geers. 
520 1 |a "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - and highlights the growing connection between computer security and national security"--Jacket. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Information warfare. 
650 0 |a Cyberterrorism. 
650 0 |a Computer crimes. 
650 6 |a Guerre de l'information. 
650 6 |a Cyberterrorisme. 
650 6 |a Criminalité informatique. 
650 7 |a HISTORY  |x Military  |x Strategy.  |2 bisacsh 
650 7 |a Computer crimes  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
650 7 |a Information warfare  |2 fast 
700 1 |a Czosseck, Christian. 
700 1 |a Geers, Kenneth. 
776 0 8 |i Print version:  |t Virtual battlefield.  |d Amsterdam ; Washington, DC : Ios Press, ©2009  |z 9781607500605  |w (DLC) 2009937744  |w (OCoLC)489010240 
830 0 |a Cryptology and information security series ;  |v v. 3.  |x 1871-6431 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=315819  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37537077 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL501446 
938 |a ebrary  |b EBRY  |n ebr10375711 
938 |a EBSCOhost  |b EBSC  |n 315819 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 260090 
938 |a YBP Library Services  |b YANK  |n 3206136 
994 |a 92  |b IZTAP