feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    New York :Bloomsbury Academic, | New York :Bloomsbury Publishing (US),
    UID:
    almahu_9949794277702882
    Format: 1 online resource (272 pages)
    Edition: 2nd ed.
    ISBN: 9798765109960
    Series Statement: Contemporary World Issues
    Content: 〈b〉Cyberwarfare, a term that encompasses a wide range of computer-based attacks on targeted enemy states, has emerged as one of the most pressing national security concerns of the 21st century.〈/b〉 All around the world, the scramble to shield thoroughly computerized military and infrastructure resources from cyber attacks is intensifying. Military experts, for example, believe that Ukraine's ability to defend its cyberspace from Russian cyber attacks was one of the key reasons Russia's dramatic 2022 invasion of neighboring Ukraine failed to topple the Ukrainian government in Kiev. This all-in-one resource explains the world of cyber warfare in authoritative but lay friendly terms. First, it details the historical evolution of cyber warfare and the different forms it can take, from crippling attacks on power grids and communications networks to secret intelligence gathering. From there it moves into a wide-ranging exploration of the main controversies and issues surrounding cyber security and cyber warfare, as well as coverage of major cyber warfare attacks, the organizations responsible, and the steps that the United States and other countries are taking to protect themselves from this constantly evolving threat. Like all books in the 〈b〉〈i〉Contemporary World Issues〈/i〉 〈/b〉series, this volume features a suite of "Perspectives" in which cyber warfare experts provide insights on various elements of cyber warfare. Other features include informative primary documents, data tables, chronology, and a glossary of terms.
    Note: 〈b〉Preface〈/b〉 〈b〉 〈/b〉〈b〉1. Background and History〈/b〉 Information as a Tool of War The Role of Communications in Modern Warfare Early Attempts at Encryption Direct Observation Techniques The Creation of Cyberspace The Cyber Attacks Begin Cyber Enabling in the Nuclear Middle East Preparation for Infrastructure Cyber Attacks Russian Hacktivists and National Pride The Chinese Approach to Irregular Warfare Non-State Actors and Cyber War Ukraine and the Digital Conflict The Current State of Cyber War References 〈b〉2. Problems, Controversies, and Solutions〈/b〉 Is a Cyber War Possible? Cyber as a Military Domain Cyber Strategy Instruments of National Power Cyber Crime, Cyber Espionage, and Cyberterrorism The Problem of Attribution The Dangers of Escalation People and Paranoia Cyber Ethics Funding Conflict Through the Cyber Domain References 〈b〉3. Perspectives〈/b〉 The DoD Information System Network as a Weapon System〈i〉 Mary E. Braun〈/i〉 The Challenges of Protecting Academia 〈i〉Kurt Peifer〈/i〉 Ransomware and the Private Sector 〈i〉Christopher R. Boom〈/i〉 Waging e-Jihad〈i〉 Heidi Dexter〈/i〉 Cyber Warfare in the Professional Military Education System 〈i〉S. Michael Pavelec〈/i〉 〈b〉4. Profiles〈/b〉 Alexander, Keith B. Anonymous CrowdStrike Defense Advanced Research Projects Agency Defense Information Systems Agency (U.S.) Equation Group Fancy Bear (Russian Hacking Group) FireEye, Inc. Google, Inc. Government Communications Headquarters (GCHQ, United Kingdom) Hayden, Michael Kaspersky, Yevgeniy "Eugene" Valentinovich Lazarus Group (DPRK Hacking Group)Lehel, Marcel Lazar ("Guccifer") Libicki, Martin Mandiant McAfee, Inc. Microsoft Corporation Mitnick, Kevin Nakasone, Paul M. National Security Agency (U.S.) NATO Cooperative Cyber Defence Centre of Excellence People's Liberation Army Unit 61398 (PRC) Qiao Liang and Wang Xiangsui RAND Corporation Rogers, Michael S. Russian Business Network Shadow Brokers, The (Hacking Group) Snowden, Edward Stuxnet Symantec Corporation Syrian Electronic Army Turing, Alan U.S. Cyber Command WikiLeaks References 〈b〉5. Documents〈/b〉 Tallinn Manual on the International Law Applicable to Cyber Warfare (2010) Michael Rogers, "Testimony before the U.S. House Intelligence Committee" (2014) People's Republic of China National Cyberspace Security Strategy (2016) Assessing Russian Activities and Intentions in Recent U.S. Elections (2017) Military and Security Developments Involving the Democratic People's Republic of Korea (2017) Glenn S. Gerstell, "How We Need to Prepare for a Global Cyber Pandemic" (2018) National Cyber Strategy of the United States (2018) Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2018) Department of Homeland Security Cybersecurity Strategy (2021) Cybersecurity & Infrastructure Security Agency, "Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure" (2022) 〈b〉 〈/b〉〈b〉6. Resources〈/b〉 Print Resources Nonprint Resources 〈b〉7. Chronology〈/b〉 〈b〉 〈/b〉〈b〉Glossary〈/b〉 〈b〉Index〈/b〉 〈b〉About the Author〈/b〉
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Santa Barbara :ABC-CLIO, | New York :Bloomsbury Publishing (US),
    UID:
    almafu_9961047190102883
    Format: 1 online resource (xlii, 314 pages) : , illustrations
    Edition: 1st ed.
    ISBN: 979-82-16-00209-3 , 979-82-16-13323-0 , 1-4408-6444-6
    Series Statement: Gale eBooks
    Content: Offering comprehensive coverage for those examining Civil War propaganda, this volume provides a broad analysis of efforts by both Union and Confederate sides to influence public opinion of America's deadliest conflict. This illuminating reference work contains excerpts from roughly 100 individual pieces of propaganda generated during the American Civil War in the North and the South, as well as contextual analysis to assist readers in understanding its utility, importance, and effect. It includes written arguments, staged photographs, and political cartoons, all of which were used to advance one side's objectives while undermining the enemy's. This helps readers to understand the underlying arguments of each side as well as the willingness of each to distort the truth for political, military, or economic advantage. This book is organized chronologically, allowing readers to understand how propaganda developed and expanded throughout the war. It includes a chapter dedicated to each of the war years (1861-1865), an antebellum chapter, and a postwar chapter. Each document comprised in the volume includes an analysis of the significance and effectiveness of the piece and guides readers to examine it with a critical eye. The original source documents remain in their original verbiage, including common spelling errors and other interesting aspects of 19th-century communication.
    Note: Introduction Chronology 1. Documents through 1860 1Abolition Frowned Down (Lithograph), 1839 2A View of the Action of the Federal Government in Behalf of Slavery, 1844 3"Thoughts on Slavery," 1848 4Slavery and the Constitution, 1849 5" 'The Higher Law' in Its Application to the Fugitive Slave Bill," November 1850 6Uncle Tom's Cabin; or, Life among the Lowly, 1851-1852 7Aunt Phillis's Cabin; or, Southern Life As It Is, 1852 8Negroes and Negro Slavery, 1853 9The North and the South, 1854 10"What Makes Slavery a Question of National Concern?" 1855 11Forcing Slavery Down the Throat of a Freesoiler (Lithograph), 1856 12The Democratic Platform (Lithograph), 1856 13"Dixie's Land" (Song), 1859 14"The Crisis," 1860 15"Benedict's 'Wide Awake' Poem," 1860 16"The Union Must Be Preserved! Four Crisis Letters," 1860 17"A Platform for All Parties," 1860 18"The Causes and Remedies of Impending National Calamities," November 20, 1860 19"An Ordinance to Dissolve the Union between the State of South Carolina and Other States," December 20, 1860 20"Declaration of the Immediate Causes Which Induce and Justify the Secession of South Carolina from the Federal Union," December 24, 1860 2. Documents from 1861 21"Slavery: A Divine Institution," 1861 22"God Save the South" (Poem), 1861 23The Hercules of the Union (Lithograph), 1861 24"An Address on the Aspect of National Affairs and the Right of Secession," March 16, 1861 25"The Nineteenth of April," 1861 (Song), 1861 26"The Massachusetts Line" (Song), May 7, 1861 27"The Great Drama; an Appeal to Maryland," May 9, 1861 28"Western Virginia on the Seizure of Sherrard Clemens" (Song), 1861 29"New England" (Song), 1861 30"Cairo" (Song), 1861 31"Secession: A Folly and a Crime," July 4, 1861 32"After Some Time Be Past," July 10, 1861 33"The Fallacy of Neutrality," July 13, 1861 34"God's Way of Crushing the Rebellion," September 29, 1861 35"All Quiet Along the Potomac To-Night" (Poem), November 30, 1861 36"Annual Message of the President," December 3, 1861 37Volunteering Down Dixie (Lithograph), 1861 38"The Army of the Potomac, and Its Mismanagement," December 4, 1861 39"The Confederate Flag: Red, White & Blue" (Song), 1861 3. Documents from 1862 40"Secession: In the Future," 1862 105 41"Battle Cry of Freedom" (Song), 1862 42"Rally Round the Flag Boys!" (Song), 1862 43"Are the Southern Privateersmen Pirates?" 1862 44"A Letter to a Friend in a Slave State," March 24, 1862 45"Some Thoughts on the Pacification of the Country, for the Consideration of the North and the South," 1862 46"Martial Law: What Is It? And Who Can Declare It?" April 2, 1862 47"The History and Theory of Revolutions," April 1862 48"Put It Through!" (Song), 1862 49"Indemnity for the Past and Security for the Future," May 19, 1862 50Thoughts for the Times: Addressed to the Considerate People of the Northern States, 1862 51"Soldiers of Our Army," 1862 52"Confiscation of Rebel Property," 1862 53Morgan's Message to Kentucky, July 15, 1862 54"On the Recognition of the Southern Confederation," 1862 55Song of the Exempts, 1862 56"Washington and Lincoln" (Song), 1862 57"Stonewall Jackson's Way" (Song), September 16, 1862 142 58The Emancipation Proclamation, September 22, 1862 59"Treason and the Punishment It Deserves," October 8, 1862 60"Martial Law," 1862 61"A Compromise" (Song), 1862 62"A Proclamation by the Confederate President," December 24, 1862 63"Abraham's Daughter, or Raw Recruits" (Song), 1862 4. Documents from 1863 64"The Continent Is Trembling," January 9, 1863 65Fourteen Months in American Bastiles, 1863 66"West Point and the War," March 1863 67"Starved in Prison" (Song), 1863 68"A Call to My Countrywomen," March 1863 69"Curses Coming Home to Roost," May 1863 70"Forward or Backward?" 1863 174 71"Freemen, Awake!! Declaration and Protest of Liberty against Usurpation and Tyranny," July 4, 1863 72"A Voice from North-Carolina," July 31, 1863 73"For the Croakers," 1863 74"War, a Necessary Evil," September 19, 1863 75"The Arguments of Secessionists," September 30, 1863 76"Neutral Relations of England and the United States," October 1, 1863 77"France, Mexico, and the Confederate States," October 5, 1863 78"The Cowards Are Coming" (Song), 1863 79"The Gettysburg Address," November 19, 1863 80"Third Annual Message of President Davis," December 7, 1863 5. Documents from 1864 81"The War and Its Close: A Discourse," April 8, 1864 82"Gideon's Water-Lappers," April 8, 1864 83The True Peace Commissioners (Lithograph), 1864 84The True Issue or "Thats Whats the Matter" (Lithograph), 1864 85"Our Captive Soldiers" (Song), 1864 86"Corruptions and Frauds of Lincoln's Administration," 1864 87Compromise with the South (Lithograph), September 3, 1864 88"Peace through Victory: A Thanksgiving Sermon," September 11, 1864 89"Mayor and Council of Atlanta to Sherman," September 11, 1864 90"Reply of Maj. Gen. Sherman to the Mayor of Atlanta," September 12, 1864 91"Coercion Completed, or Treason Triumphant," September 1864 92"A Song for the Boys," 1864 93"Lincoln or McClellan: Appeal to the Germans in America," 1864 94"Message from the President of the United States to the Two Houses of Congress," December 6, 1864 6. Documents from 1865 and Beyond 95"The Conquered Banner" (Poem), April 1865 96The Chas-ed "Old Lady" of the C.S.A. (Lithograph), May 1865 97The "Rail Splitter" at Work Repairing the Union (Lithograph), 1865 98"Can a State Secede? Sovereignty in Its Bearing upon Secession and State Rights," 1865 99"Sherman's March to the Sea" (Song), 1865 100"The Nation" (Poem), 1866 101"The Burning of Columbia, S.C.," 1866 102"The Blue and the Gray" (Poem), 1867 103The Great American Tanner (Lithograph), 1868 104This Is a White Man's Government (Lithograph), September 5, 1868 105"Address on the Life and Character of Gen. Robert E. Lee," October 12, 1871 106"The Military-Prison Keepers of the Late Southern Confederacy, in the Van of the Democratic Party," 1876 107Of Course He Wants to Vote the Democratic Ticket (Lithograph), October 21, 1876 108"General Sherman's March from Atlanta to the Coast," April 26, 1884 109"An Humble Belisarius; or the Life of a 'Johnny Reb,' " 1885 110"Song of the Irish Veteran," 1887 111"Jeff. Davis Spouting Treason," 1887 (Song) 112"Responsibility for the War of Secession," 1893 Bibliography Index
    Additional Edition: ISBN 1-4408-6443-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Santa Barbara, Calif. [u.a.] :ABC-CLIO,
    UID:
    almafu_BV041167827
    Format: 1 Online-Ressource (XII, 297 S.).
    ISBN: 978-1-598-84732-1 , 978-1-598-84733-8
    Series Statement: Contemporary world issues series
    Note: Includes bibliographical references and index
    Language: English
    Keywords: Militärroboter ; Drohne
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Frankfurt am Main [u.a.] :Lang,
    UID:
    almahu_BV000862361
    Format: III, 124 S.
    ISBN: 3-631-40475-1
    Series Statement: Europäische Hochschulschriften : Reihe 2, Rechtswissenschaft 748
    Note: Zugl.: Bielefeld, Univ., Diss., 1988
    Language: German
    Subjects: Law
    RVK:
    Keywords: Werkvertrag ; Abnahme ; Hochschulschrift ; Hochschulschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Santa Barbara, California :Greenwood, an imprint of ABC-CLIO, | New York :Bloomsbury Publishing (US),
    UID:
    almafu_9961373872202883
    Format: 1 online resource (xvii, 357 pages).
    ISBN: 979-84-00-63647-9 , 979-82-16-07053-5 , 1-4408-7279-1
    Series Statement: Documentary and reference guides
    Content: This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare.The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare.
    Note: GOBI , 1. U.S. cyber strategy documents -- 2. U.S. assessments of cyber adversaries -- 3. U.S. policies, doctrine, and reports -- 4. Non-U.S. strategy and documents -- 5. Speeches, testimony, and transcripts.
    Additional Edition: ISBN 1-4408-7278-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Santa Barbara, Calif. :ABC-CLIO, an imprint of ABC-CLIO, LLC, | New York :Bloomsbury Publishing (US),
    UID:
    almafu_9960962800102883
    Format: 1 online resource (xvi, 340 pages) : , illustrations.
    ISBN: 979-84-00-63648-6 , 979-82-16-07054-2 , 1-78684-445-1 , 1-61069-444-9
    Series Statement: Contemporary world issues
    Content: This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.
    Note: Description based upon print version of record. , Cover; Half Title; Title Page; Copyright ; Contents; Preface; 1: Background and History; Information as a Tool of War; The Role of Communications in Modern Warfare; Early Attempts at Encryption; Direct Observation Techniques; The Creation of Cyberspace; The Cyber Attacks Begin; Cyber Enabling in the Nuclear Middle East; Preparations for Infrastructure Cyber Attacks; Russian Hacktivists and National Pride; The Chinese Approach to Irregular Warfare; The Current State of Cyber War; References; 2: Problems, Controversies, and Solutions; Is a Cyber War Possible?; Cyber as a Military Domain , Cyber StrategyInstruments of National Power; Cyber Crime, Cyber Espionage, Cyberterrorism; The Problem of Attribution; People and Paranoia; Cyber Ethics; References; 3: Perspectives; Escalation in Cyberspace; Conclusions; Training Tomorrow's Cyber Warriors; Cyber Warfare in the Professional Military Education System; Waging e-Jihad; The Relationship between Space and Cyber Assets; References; 4: Profiles; Alexander, Keith B.; Alperovitch, Dmitri; Anonymous; Carpenter, Shawn; Carr, Jeffrey; Clarke, Richard Alan; Defense Advanced Research Projects Agency (DARPA) , Defense Information Systems Agency (U.S.)FireEye, Inc.; Google, Inc.; Hayden, Michael; Kaspersky, Yevgeniy "Eugene" Valentinovich; Libicki, Martin; Mandiant; McAfee, Inc.; Microsoft Corporation; Mitnick, Kevin; National Security Agency; NATO Cooperative Cyber Defence Centre of Excellence; People's Liberation Army Unit 61398 (China); Qiao Liang and Wang Xiangsui; RAND Corporation; Rogers, Michael S.; Russian Business Network (RBN); Snowden, Edward; Symantec Corporation; Syrian Electronic Army; Tenenbaum, Ehud "Udi"; U.S. Cyber Command; WikiLeaks; References; 5: Documents , Excerpts from the North Atlantic Treaty (1949)Remarks of President Barack Obama on Securing the Nation's Cyber Infrastructure,Washington, D.C., May 29, 2009; Excerpts of Secretary of State Hillary Clinton on Internet Freedom, Washington, D.C., January 21, 2010; Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010; Excerpts of "International Strategy for Cyberspace," May 2011; Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012 , Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: "Resilient Military Systems and the Advanced Cyber Threat," January 2013Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013; 6: Resources; Print Resources; Nonprint Resources; 7: Chronology; Glossary; Index; About the Author , English
    Additional Edition: ISBN 1-61069-443-0
    Additional Edition: ISBN 1-322-97451-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Westport, CT :Praeger, | London :Bloomsbury Publishing (UK),
    UID:
    almafu_9961047019902883
    Format: 1 online resource (ix, 259 pages) : , illustrations, maps
    Edition: 1st ed.
    ISBN: 979-84-00-69470-7 , 979-82-16-12625-6 , 1-4408-3086-X
    Series Statement: Praeger Security International
    Content: Military robots are affecting both the decision to go to war and the means by which wars are conducted. This book covers the history of military robotics, analyzes their current employment, and examines the ramifications of their future utilization. Robotic systems are the future of military conflicts: their development is already revolutionizing the nature of human conflict-and eroding the standards of acceptable behavior in wartime. Written by a professor who teaches strategy and leadership for the U.S. Air Force, one of the global leaders in the development and utilization of military robots, this book both addresses the history of military robotics and discusses the troubling future ramifications of this game-changing technology. Organized both chronologically and thematically, the book's chapters describe the development and evolution of unmanned warfare; clarify the past, current, and future capabilities of military robotics; and offer a detailed and convincing argument that limits should be placed upon their development before it is too late. This standout work presents an eye-opening analysis that military personnel, civil servants, and academic instructors who teach military history, social policy, and ethics can ill afford to ignore, and will also provide the general public with information that will correct misconceptions about military robotics derived through popular culture and the news media.
    Note: Preface 1 The Revolution Has Arrived 2 A Short Guide to Revolutions 3 The Long Gray Line 4 Automating the Battlefield 5 Robot Lawyers 6 Morality for Machines? 7 The Global Competition 8 The Road Map Notes Bibliography Index A photo essay follows page
    Additional Edition: ISBN 1-4408-3085-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    Santa Barbara (California) : Praeger, an imprint of ABC-CLIO, LCC
    UID:
    gbv_1636119301
    Format: ix, 259 Seiten , Fotografien, Karten
    ISBN: 9781440830853
    Series Statement: Praeger Security International
    Content: "This book covers the history of military robotics, analyses their current employment, and examines the ramifications of their future utilization"--Provided by publisher
    Note: Literaturverzeichnis Seite 239-251, Register , The revolution has arrived , A short guide to revolutions , The long gray line , Automating the battlefield , Robot lawyers , Morality for machines? , The global competition , The road map
    Additional Edition: ISBN 9781440830860
    Additional Edition: Erscheint auch als Online-Ausgabe Springer, Paul J., author Outsourcing war to machines Santa Barbara : Praeger Security International, [2018]
    Language: English
    Keywords: Militärroboter ; Drohne ; Militärische Forschung ; Kriegführung ; Ethik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    kobvindex_EIM326517251
    Format: 154 S.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Book
    Book
    Santa Barbara : ABC-Clio
    UID:
    kobvindex_ZLB15977533
    Format: 340 Seiten
    ISBN: 9781610694438
    Series Statement: Contemporary world issues
    Note: Includes bibliographical references and index
    Language: English
    Keywords: Cyberspace ; Information warfare ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages