Cyber blockades

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Russell, Alison Lawlor (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Washington DC Georgetown University Press [2014]
Schlagworte:
Online-Zugang:DE-1046
DE-1047
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV043029861
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151120s2014 xx o|||| 00||| eng d
020 |a 1626161119  |9 1-62616-111-9 
020 |a 1626161127  |9 1-62616-112-7 
020 |a 1626161135  |9 1-62616-113-5 
020 |a 9781626161115  |9 978-1-62616-111-5 
020 |a 9781626161122  |9 978-1-62616-112-2 
020 |a 9781626161139  |9 978-1-62616-113-9 
035 |a (OCoLC)892430303 
035 |a (DE-599)BVBBV043029861 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 327.1/17  |2 23 
100 1 |a Russell, Alison Lawlor  |e Verfasser  |4 aut 
245 1 0 |a Cyber blockades  |c Alison Lawlor Russell 
264 1 |a Washington DC  |b Georgetown University Press  |c [2014] 
264 4 |c © 2014 
300 |a 1 online resource (175 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Print version record 
505 8 |a List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index 
505 8 |a "Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher 
650 7 |a POLITICAL SCIENCE / Government / International  |2 bisacsh 
650 7 |a POLITICAL SCIENCE / International Relations / General  |2 bisacsh 
650 7 |a POLITICAL SCIENCE / Security (National & International)  |2 bisacsh 
650 4 |a Cyberterrorism 
650 4 |a Cyberterrorism  |x Prevention 
650 4 |a Cyberspace  |x Security measures 
650 4 |a Computer security 
650 0 7 |a Terrorismus  |0 (DE-588)4059534-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Internet  |0 (DE-588)4308416-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheit  |0 (DE-588)4054790-5  |2 gnd  |9 rswk-swf 
689 0 0 |a Internet  |0 (DE-588)4308416-3  |D s 
689 0 1 |a Terrorismus  |0 (DE-588)4059534-1  |D s 
689 0 2 |a Sicherheit  |0 (DE-588)4054790-5  |D s 
689 0 |8 1\p  |5 DE-604 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Russell, Alison Lawlor, author  |t Cyber blockades 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028454513 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030  |l DE-1046  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030  |l DE-1047  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819295273379168256
any_adam_object
author Russell, Alison Lawlor
author_facet Russell, Alison Lawlor
author_role aut
author_sort Russell, Alison Lawlor
author_variant a l r al alr
building Verbundindex
bvnumber BV043029861
collection ZDB-4-EBA
contents List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index
"Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher
ctrlnum (OCoLC)892430303
(DE-599)BVBBV043029861
dewey-full 327.1/17
dewey-hundreds 300 - Social sciences
dewey-ones 327 - International relations
dewey-raw 327.1/17
dewey-search 327.1/17
dewey-sort 3327.1 217
dewey-tens 320 - Political science (Politics and government)
discipline Politologie
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04364nam a2200613zc 4500</leader><controlfield tag="001">BV043029861</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2014 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626161119</subfield><subfield code="9">1-62616-111-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626161127</subfield><subfield code="9">1-62616-112-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1626161135</subfield><subfield code="9">1-62616-113-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626161115</subfield><subfield code="9">978-1-62616-111-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626161122</subfield><subfield code="9">978-1-62616-112-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626161139</subfield><subfield code="9">978-1-62616-113-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)892430303</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043029861</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.1/17</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Russell, Alison Lawlor</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber blockades</subfield><subfield code="c">Alison Lawlor Russell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington DC</subfield><subfield code="b">Georgetown University Press</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (175 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Government / International</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / International Relations / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National &amp; International)</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Russell, Alison Lawlor, author</subfield><subfield code="t">Cyber blockades</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=860030</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028454513</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=860030</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=860030</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043029861
illustrated Not Illustrated
indexdate 2024-12-24T04:39:24Z
institution BVB
isbn 1626161119
1626161127
1626161135
9781626161115
9781626161122
9781626161139
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028454513
oclc_num 892430303
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 online resource (175 pages)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2014
publishDateSearch 2014
publishDateSort 2014
publisher Georgetown University Press
record_format marc
spelling Russell, Alison Lawlor Verfasser aut
Cyber blockades Alison Lawlor Russell
Washington DC Georgetown University Press [2014]
© 2014
1 online resource (175 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Print version record
List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index
"Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher
POLITICAL SCIENCE / Government / International bisacsh
POLITICAL SCIENCE / International Relations / General bisacsh
POLITICAL SCIENCE / Security (National & International) bisacsh
Cyberterrorism
Cyberterrorism Prevention
Cyberspace Security measures
Computer security
Terrorismus (DE-588)4059534-1 gnd rswk-swf
Internet (DE-588)4308416-3 gnd rswk-swf
Sicherheit (DE-588)4054790-5 gnd rswk-swf
Internet (DE-588)4308416-3 s
Terrorismus (DE-588)4059534-1 s
Sicherheit (DE-588)4054790-5 s
1\p DE-604
Erscheint auch als Druck-Ausgabe Russell, Alison Lawlor, author Cyber blockades
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030 Aggregator Volltext
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Russell, Alison Lawlor
Cyber blockades
List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index
"Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher
POLITICAL SCIENCE / Government / International bisacsh
POLITICAL SCIENCE / International Relations / General bisacsh
POLITICAL SCIENCE / Security (National & International) bisacsh
Cyberterrorism
Cyberterrorism Prevention
Cyberspace Security measures
Computer security
Terrorismus (DE-588)4059534-1 gnd
Internet (DE-588)4308416-3 gnd
Sicherheit (DE-588)4054790-5 gnd
subject_GND (DE-588)4059534-1
(DE-588)4308416-3
(DE-588)4054790-5
title Cyber blockades
title_auth Cyber blockades
title_exact_search Cyber blockades
title_full Cyber blockades Alison Lawlor Russell
title_fullStr Cyber blockades Alison Lawlor Russell
title_full_unstemmed Cyber blockades Alison Lawlor Russell
title_short Cyber blockades
title_sort cyber blockades
topic POLITICAL SCIENCE / Government / International bisacsh
POLITICAL SCIENCE / International Relations / General bisacsh
POLITICAL SCIENCE / Security (National & International) bisacsh
Cyberterrorism
Cyberterrorism Prevention
Cyberspace Security measures
Computer security
Terrorismus (DE-588)4059534-1 gnd
Internet (DE-588)4308416-3 gnd
Sicherheit (DE-588)4054790-5 gnd
topic_facet POLITICAL SCIENCE / Government / International
POLITICAL SCIENCE / International Relations / General
POLITICAL SCIENCE / Security (National & International)
Cyberterrorism
Cyberterrorism Prevention
Cyberspace Security measures
Computer security
Terrorismus
Internet
Sicherheit
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030
work_keys_str_mv AT russellalisonlawlor cyberblockades