Surviving cyberwar

He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Stiennon, Richard 1959- (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Lanham, Md. [u.a.] Government Institutes 2010
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV036726084
003 DE-604
005 20140115
007 t|
008 101018s2010 xx |||| 00||| eng d
020 |a 9781605906744  |9 978-1-60590-674-4 
020 |a 9781605906881  |9 978-1-60590-688-1 
020 |a 9781605906751  |9 978-1-60590-675-1 
035 |a (OCoLC)705910718 
035 |a (DE-599)BVBBV036726084 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-12  |a DE-188 
050 0 |a U163.S73 
082 0 |a 355.343 
100 1 |a Stiennon, Richard  |d 1959-  |e Verfasser  |0 (DE-588)1046386530  |4 aut 
245 1 0 |a Surviving cyberwar  |c Richard Stiennon 
264 1 |a Lanham, Md. [u.a.]  |b Government Institutes  |c 2010 
300 |a IX, 170 S. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
500 |a Includes bibliographical references (p. 157-164) and index 
505 0 |a Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions 
520 |a  He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries.  
650 4 |a Information warfare / United States 
650 4 |a Cyberterrorism / United States / Prevention 
650 4 |a Cyberspace / Security measures 
650 4 |a Computer networks / Security measures / United States 
650 4 |a Civil defense / United States 
650 0 7 |a Information warfare  |0 (DE-588)4461975-3  |2 gnd  |9 rswk-swf 
651 4 |a USA 
689 0 0 |a Information warfare  |0 (DE-588)4461975-3  |D s 
689 0 |5 DE-604 
943 1 |a oai:aleph.bib-bvb.de:BVB01-020643848 

Datensatz im Suchindex

_version_ 1819278439220248576
any_adam_object
author Stiennon, Richard 1959-
author_GND (DE-588)1046386530
author_facet Stiennon, Richard 1959-
author_role aut
author_sort Stiennon, Richard 1959-
author_variant r s rs
building Verbundindex
bvnumber BV036726084
callnumber-first U - Military Science
callnumber-label U163
callnumber-raw U163.S73
callnumber-search U163.S73
callnumber-sort U 3163 S73
callnumber-subject U - General Military Science
contents Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions
ctrlnum (OCoLC)705910718
(DE-599)BVBBV036726084
dewey-full 355.343
dewey-hundreds 300 - Social sciences
dewey-ones 355 - Military science
dewey-raw 355.343
dewey-search 355.343
dewey-sort 3355.343
dewey-tens 350 - Public administration and military science
discipline Militärwissenschaft
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02699nam a2200445 c 4500</leader><controlfield tag="001">BV036726084</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140115 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101018s2010 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605906744</subfield><subfield code="9">978-1-60590-674-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605906881</subfield><subfield code="9">978-1-60590-688-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605906751</subfield><subfield code="9">978-1-60590-675-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)705910718</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036726084</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163.S73</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.343</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stiennon, Richard</subfield><subfield code="d">1959-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1046386530</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Surviving cyberwar</subfield><subfield code="c">Richard Stiennon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Lanham, Md. [u.a.]</subfield><subfield code="b">Government Institutes</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 170 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 157-164) and index</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a"> He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries. </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / United States / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Civil defense / United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020643848</subfield></datafield></record></collection>
geographic USA
geographic_facet USA
id DE-604.BV036726084
illustrated Not Illustrated
indexdate 2024-12-24T00:12:00Z
institution BVB
isbn 9781605906744
9781605906881
9781605906751
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-020643848
oclc_num 705910718
open_access_boolean
owner DE-12
DE-188
owner_facet DE-12
DE-188
physical IX, 170 S.
publishDate 2010
publishDateSearch 2010
publishDateSort 2010
publisher Government Institutes
record_format marc
spelling Stiennon, Richard 1959- Verfasser (DE-588)1046386530 aut
Surviving cyberwar Richard Stiennon
Lanham, Md. [u.a.] Government Institutes 2010
IX, 170 S.
txt rdacontent
n rdamedia
nc rdacarrier
Includes bibliographical references (p. 157-164) and index
Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions
He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries.
Information warfare / United States
Cyberterrorism / United States / Prevention
Cyberspace / Security measures
Computer networks / Security measures / United States
Civil defense / United States
Information warfare (DE-588)4461975-3 gnd rswk-swf
USA
Information warfare (DE-588)4461975-3 s
DE-604
spellingShingle Stiennon, Richard 1959-
Surviving cyberwar
Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions
Information warfare / United States
Cyberterrorism / United States / Prevention
Cyberspace / Security measures
Computer networks / Security measures / United States
Civil defense / United States
Information warfare (DE-588)4461975-3 gnd
subject_GND (DE-588)4461975-3
title Surviving cyberwar
title_auth Surviving cyberwar
title_exact_search Surviving cyberwar
title_full Surviving cyberwar Richard Stiennon
title_fullStr Surviving cyberwar Richard Stiennon
title_full_unstemmed Surviving cyberwar Richard Stiennon
title_short Surviving cyberwar
title_sort surviving cyberwar
topic Information warfare / United States
Cyberterrorism / United States / Prevention
Cyberspace / Security measures
Computer networks / Security measures / United States
Civil defense / United States
Information warfare (DE-588)4461975-3 gnd
topic_facet Information warfare / United States
Cyberterrorism / United States / Prevention
Cyberspace / Security measures
Computer networks / Security measures / United States
Civil defense / United States
Information warfare
USA
work_keys_str_mv AT stiennonrichard survivingcyberwar