UID:
almafu_9960962800102883
Umfang:
1 online resource (xvi, 340 pages) :
,
illustrations.
ISBN:
979-84-00-63648-6
,
979-82-16-07054-2
,
1-78684-445-1
,
1-61069-444-9
Serie:
Contemporary world issues
Inhalt:
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.
Anmerkung:
Description based upon print version of record.
,
Cover; Half Title; Title Page; Copyright ; Contents; Preface; 1: Background and History; Information as a Tool of War; The Role of Communications in Modern Warfare; Early Attempts at Encryption; Direct Observation Techniques; The Creation of Cyberspace; The Cyber Attacks Begin; Cyber Enabling in the Nuclear Middle East; Preparations for Infrastructure Cyber Attacks; Russian Hacktivists and National Pride; The Chinese Approach to Irregular Warfare; The Current State of Cyber War; References; 2: Problems, Controversies, and Solutions; Is a Cyber War Possible?; Cyber as a Military Domain
,
Cyber StrategyInstruments of National Power; Cyber Crime, Cyber Espionage, Cyberterrorism; The Problem of Attribution; People and Paranoia; Cyber Ethics; References; 3: Perspectives; Escalation in Cyberspace; Conclusions; Training Tomorrow's Cyber Warriors; Cyber Warfare in the Professional Military Education System; Waging e-Jihad; The Relationship between Space and Cyber Assets; References; 4: Profiles; Alexander, Keith B.; Alperovitch, Dmitri; Anonymous; Carpenter, Shawn; Carr, Jeffrey; Clarke, Richard Alan; Defense Advanced Research Projects Agency (DARPA)
,
Defense Information Systems Agency (U.S.)FireEye, Inc.; Google, Inc.; Hayden, Michael; Kaspersky, Yevgeniy "Eugene" Valentinovich; Libicki, Martin; Mandiant; McAfee, Inc.; Microsoft Corporation; Mitnick, Kevin; National Security Agency; NATO Cooperative Cyber Defence Centre of Excellence; People's Liberation Army Unit 61398 (China); Qiao Liang and Wang Xiangsui; RAND Corporation; Rogers, Michael S.; Russian Business Network (RBN); Snowden, Edward; Symantec Corporation; Syrian Electronic Army; Tenenbaum, Ehud "Udi"; U.S. Cyber Command; WikiLeaks; References; 5: Documents
,
Excerpts from the North Atlantic Treaty (1949)Remarks of President Barack Obama on Securing the Nation's Cyber Infrastructure,Washington, D.C., May 29, 2009; Excerpts of Secretary of State Hillary Clinton on Internet Freedom, Washington, D.C., January 21, 2010; Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010; Excerpts of "International Strategy for Cyberspace," May 2011; Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012
,
Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: "Resilient Military Systems and the Advanced Cyber Threat," January 2013Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013; 6: Resources; Print Resources; Nonprint Resources; 7: Chronology; Glossary; Index; About the Author
,
English
Weitere Ausg.:
ISBN 1-61069-443-0
Weitere Ausg.:
ISBN 1-322-97451-9
Sprache:
Englisch
DOI:
10.5040/9798400636486