Cargando…

Encyclopedia of cyber warfare /

"This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Springer, Paul J. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Barbara, California : ABC-CLIO, [2017]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000008i 4500
001 EBSCO_on1286473744
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 170117s2017 cau obe 001 0 eng
010 |a  2017002115 
040 |a DLC  |b eng  |e rda  |c DLC  |d N$T  |d OCLCF  |d IDEBK  |d YDX  |d EBLCP  |d CSAIL  |d NRC  |d UPM  |d TEFOD  |d GGVRL  |d MERUC  |d NBT  |d IUL  |d WAU  |d ORZ  |d TEU  |d WYU  |d CGN  |d UKAHL  |d NJT  |d IAI  |d CES  |d FTB  |d OCLCO  |d SHC  |d OCLCQ  |d DGW  |d UKMGB  |d BLOOM 
015 |a GBC3D0423  |2 bnb 
016 7 |a 021122969  |2 Uk 
019 |a 969204515  |a 990337316  |a 991113058  |a 1029315960  |a 1097141825  |a 1300550282  |a 1329667676 
020 |a 9781440844256  |q electronic book 
020 |a 1440844259  |q electronic book 
020 |z 9781440844249  |q hardcopy  |q alkaline paper 
020 |z 1440844240  |q hardcover  |q alkaline paper 
020 |a 9798216070528  |q Electronic book (EPUB format) 
029 1 |a AU@  |b 000059526518 
029 1 |a UKMGB  |b 021122969 
035 |a (OCoLC)1286473744  |z (OCoLC)969204515  |z (OCoLC)990337316  |z (OCoLC)991113058  |z (OCoLC)1029315960  |z (OCoLC)1097141825  |z (OCoLC)1300550282  |z (OCoLC)1329667676 
037 |a BC2E146E-AB3D-4393-9B66-8ED1EC95BD50  |b OverDrive, Inc.  |n http://www.overdrive.com 
042 |a pcc 
043 |a n-us--- 
050 1 0 |a U163  |b .E53 2017 
072 7 |a HIS  |x 027130  |2 bisacsh 
072 7 |a TEC  |x 025000  |2 bisacsh 
082 0 0 |a 355.4/1  |2 23 
049 |a UAMI 
245 0 0 |a Encyclopedia of cyber warfare /  |c Paul J. Springer, editor. 
264 1 |a Santa Barbara, California :  |b ABC-CLIO,  |c [2017] 
300 |a 1 online resource (xx, 379 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b n  |2 rdamedia 
338 |a online resource  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source, unclassified data. Not only are the sources more readily available, but they tend to be more applicable to the target audience for this work. The authors come from a wide variety of backgrounds, with a substantial number of them serving in the military or other governmental institutions. As such, it needs to be stated that the ideas and arguments presented in this volume are the opinions of the individual authors, based upon their expertise, and do not represent the position of any government, military entity, or institution."--Provided by publisher. 
588 |a Description based on online resource; title from digital title page (viewed on December 21, 2021). 
505 0 |a Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing 
505 8 |a Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA) 
505 8 |a Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker 
505 8 |a HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L 
505 8 |a Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST) 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Cyberspace operations (Military science)  |z United States  |v Encyclopedias. 
650 0 |a Cyberterrorism  |v Encyclopedias. 
650 6 |a Cyberguerre (Science militaire)  |z États-Unis  |v Encyclopédies. 
650 6 |a Cyberterrorisme  |v Encyclopédies. 
650 7 |a HISTORY  |x Military  |x Other.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Military Science.  |2 bisacsh 
650 7 |a Cyberspace operations (Military science)  |2 fast  |0 (OCoLC)fst01909446 
650 7 |a Cyberterrorism.  |2 fast  |0 (OCoLC)fst00885802 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
650 7 |a Politics & government.  |2 bicssc 
655 7 |a Encyclopedias.  |2 fast  |0 (OCoLC)fst01423798 
700 1 |a Springer, Paul J.,  |e editor. 
776 0 8 |i Print version:  |t Encyclopedia of cyber warfare  |d ABC-CLIO, LLC : Santa Barbara, CA, [2017]  |z 9781440844249  |w (DLC) 2016058373 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1538359  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 20345486 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32307254 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4883012 
938 |a EBSCOhost  |b EBSC  |n 1538359 
938 |a Gale Cengage Learning  |b GVRL  |n GVRL7JKI 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis38394370 
938 |a YBP Library Services  |b YANK  |n 14643235 
938 |a Bloomsbury Publishing  |b BLOO  |n BP9798400636462BC 
994 |a 92  |b IZTAP