Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1696647517
    Format: 1 online resource (256 pages)
    ISBN: 9780124079267
    Content: Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it. Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent.
    Content: Front Cover -- Introduction to Cyber-Warfare: A Multidisciplinary Approach -- Copyright -- Contents -- Preface -- Foreword -- Introduction -- References -- Biography -- Chapter 1: Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Origin -- Structure -- Purpose -- Information Assurance -- References -- Part: I Cyber Attack -- Chapter 2: Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- The Estonian Government´s Response -- The End of the Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- References -- Chapter 3: How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Objectives of the Attack -- Coordination with Conventional Forces -- Reconnaissance and Preparation -- Attribution -- Preparing for a Cyber-Capable Adversary -- Cyber as a Battlefield Operating System -- The Cyber Aspect of the Area of Interest -- Cyber Reconnaissance and Surveillance (R&S) -- Summary -- Suggested Further Reading -- References -- Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War´´ of 2006 -- The Information Operations of Hezbollah -- Hezbollah Hijacks IP Addresses -- Civilians in the Cyber Melee: Operation Cast Lead -- IO and Cyber Warfare in the 2008 Israel-Hamas War -- Summary -- Suggested Further Reading -- References.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: ISBN 9780124078147
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780124078147
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages