Cyber blockades
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Washington DC
Georgetown University Press
[2014]
|
Schlagworte: | |
Online-Zugang: | DE-1046 DE-1047 Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043029861 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2014 xx o|||| 00||| eng d | ||
020 | |a 1626161119 |9 1-62616-111-9 | ||
020 | |a 1626161127 |9 1-62616-112-7 | ||
020 | |a 1626161135 |9 1-62616-113-5 | ||
020 | |a 9781626161115 |9 978-1-62616-111-5 | ||
020 | |a 9781626161122 |9 978-1-62616-112-2 | ||
020 | |a 9781626161139 |9 978-1-62616-113-9 | ||
035 | |a (OCoLC)892430303 | ||
035 | |a (DE-599)BVBBV043029861 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 327.1/17 |2 23 | |
100 | 1 | |a Russell, Alison Lawlor |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber blockades |c Alison Lawlor Russell |
264 | 1 | |a Washington DC |b Georgetown University Press |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (175 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index | |
505 | 8 | |a "Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher | |
650 | 7 | |a POLITICAL SCIENCE / Government / International |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / International Relations / General |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Security (National & International) |2 bisacsh | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Russell, Alison Lawlor, author |t Cyber blockades |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028454513 | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030 |l DE-1046 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030 |l DE-1047 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1819295273379168256 |
---|---|
any_adam_object | |
author | Russell, Alison Lawlor |
author_facet | Russell, Alison Lawlor |
author_role | aut |
author_sort | Russell, Alison Lawlor |
author_variant | a l r al alr |
building | Verbundindex |
bvnumber | BV043029861 |
collection | ZDB-4-EBA |
contents | List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index "Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher |
ctrlnum | (OCoLC)892430303 (DE-599)BVBBV043029861 |
dewey-full | 327.1/17 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.1/17 |
dewey-search | 327.1/17 |
dewey-sort | 3327.1 217 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04364nam a2200613zc 4500</leader><controlfield tag="001">BV043029861</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2014 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626161119</subfield><subfield code="9">1-62616-111-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626161127</subfield><subfield code="9">1-62616-112-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626161135</subfield><subfield code="9">1-62616-113-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626161115</subfield><subfield code="9">978-1-62616-111-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626161122</subfield><subfield code="9">978-1-62616-112-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626161139</subfield><subfield code="9">978-1-62616-113-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)892430303</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043029861</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.1/17</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Russell, Alison Lawlor</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber blockades</subfield><subfield code="c">Alison Lawlor Russell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington DC</subfield><subfield code="b">Georgetown University Press</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (175 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Government / International</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / International Relations / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National & International)</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Russell, Alison Lawlor, author</subfield><subfield code="t">Cyber blockades</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028454513</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043029861 |
illustrated | Not Illustrated |
indexdate | 2024-12-24T04:39:24Z |
institution | BVB |
isbn | 1626161119 1626161127 1626161135 9781626161115 9781626161122 9781626161139 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028454513 |
oclc_num | 892430303 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource (175 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Georgetown University Press |
record_format | marc |
spelling | Russell, Alison Lawlor Verfasser aut Cyber blockades Alison Lawlor Russell Washington DC Georgetown University Press [2014] © 2014 1 online resource (175 pages) txt rdacontent c rdamedia cr rdacarrier Print version record List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index "Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher POLITICAL SCIENCE / Government / International bisacsh POLITICAL SCIENCE / International Relations / General bisacsh POLITICAL SCIENCE / Security (National & International) bisacsh Cyberterrorism Cyberterrorism Prevention Cyberspace Security measures Computer security Terrorismus (DE-588)4059534-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Internet (DE-588)4308416-3 s Terrorismus (DE-588)4059534-1 s Sicherheit (DE-588)4054790-5 s 1\p DE-604 Erscheint auch als Druck-Ausgabe Russell, Alison Lawlor, author Cyber blockades http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Russell, Alison Lawlor Cyber blockades List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index "Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher POLITICAL SCIENCE / Government / International bisacsh POLITICAL SCIENCE / International Relations / General bisacsh POLITICAL SCIENCE / Security (National & International) bisacsh Cyberterrorism Cyberterrorism Prevention Cyberspace Security measures Computer security Terrorismus (DE-588)4059534-1 gnd Internet (DE-588)4308416-3 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)4059534-1 (DE-588)4308416-3 (DE-588)4054790-5 |
title | Cyber blockades |
title_auth | Cyber blockades |
title_exact_search | Cyber blockades |
title_full | Cyber blockades Alison Lawlor Russell |
title_fullStr | Cyber blockades Alison Lawlor Russell |
title_full_unstemmed | Cyber blockades Alison Lawlor Russell |
title_short | Cyber blockades |
title_sort | cyber blockades |
topic | POLITICAL SCIENCE / Government / International bisacsh POLITICAL SCIENCE / International Relations / General bisacsh POLITICAL SCIENCE / Security (National & International) bisacsh Cyberterrorism Cyberterrorism Prevention Cyberspace Security measures Computer security Terrorismus (DE-588)4059534-1 gnd Internet (DE-588)4308416-3 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | POLITICAL SCIENCE / Government / International POLITICAL SCIENCE / International Relations / General POLITICAL SCIENCE / Security (National & International) Cyberterrorism Cyberterrorism Prevention Cyberspace Security measures Computer security Terrorismus Internet Sicherheit |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030 |
work_keys_str_mv | AT russellalisonlawlor cyberblockades |