The hacker and the state cyber attacks and the new normal of geopolitics

The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global cont...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Buchanan, Ben (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cambridge, Massachusetts ; London, England Harvard University Press [2020]
Schlagworte:
Online-Zugang:DE-1043
DE-1046
DE-858
DE-Aug4
DE-859
DE-860
DE-91
DE-473
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV046761000
003 DE-604
005 20240220
007 cr|uuu---uuuuu
008 200615s2020 xx o|||| 00||| eng d
020 |a 9780674246010  |q PDF  |9 978-0-674-24601-0 
020 |a 9780674245983  |q EPUB  |9 978-0-674-24598-3 
020 |a 9780674245990  |q MOBI  |9 978-0-674-24599-0 
024 7 |a 10.4159/9780674246010  |2 doi 
035 |a (ZDB-23-DGG)9780674246010 
035 |a (OCoLC)1164653601 
035 |a (DE-599)BVBBV046761000 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1046  |a DE-Aug4  |a DE-859  |a DE-860  |a DE-473  |a DE-739  |a DE-1043  |a DE-858  |a DE-91 
082 0 |a 005.8/7  |2 23 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a DAT 461  |2 stub 
084 |a DAT 055  |2 stub 
100 1 |a Buchanan, Ben  |e Verfasser  |0 (DE-588)1126122939  |4 aut 
245 1 0 |a The hacker and the state  |b cyber attacks and the new normal of geopolitics  |c Ben Buchanan 
264 1 |a Cambridge, Massachusetts ; London, England  |b Harvard University Press  |c [2020] 
264 4 |c © 2020 
300 |a 1 Online-Ressource (412 Seiten) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
520 |a The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global contest for geopolitical advantage 
650 7 |a POLITICAL SCIENCE / Intelligence & Espionage  |2 bisacsh 
650 4 |a Cyber intelligence (Computer security) 
650 4 |a Cyberspace operations (Military science) 
650 4 |a Cyberspace  |x Political aspects 
650 4 |a Cyberterrorism 
650 4 |a Hacking  |x Political aspects 
650 0 7 |a Cyberterrorismus  |0 (DE-588)1118882725  |2 gnd  |9 rswk-swf 
650 0 7 |a Geopolitik  |0 (DE-588)4156741-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Information warfare  |0 (DE-588)4461975-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Cyberattacke  |0 (DE-588)1075612675  |2 gnd  |9 rswk-swf 
689 0 0 |a Cyberattacke  |0 (DE-588)1075612675  |D s 
689 0 1 |a Information warfare  |0 (DE-588)4461975-3  |D s 
689 0 2 |a Cyberterrorismus  |0 (DE-588)1118882725  |D s 
689 0 3 |a Geopolitik  |0 (DE-588)4156741-9  |D s 
689 0 |8 1\p  |5 DE-604 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-0-674-98755-5 
856 4 0 |u https://www.degruyter.com/isbn/9780674246010  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-23-DGG 
912 |a ZDB-30-PQE 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-032170536 
966 e |u https://www.degruyter.com/isbn/9780674246010  |l DE-1043  |p ZDB-23-DGG  |q FAB_PDA_DGG  |x Verlag  |3 Volltext 
966 e |u https://www.degruyter.com/isbn/9780674246010  |l DE-1046  |p ZDB-23-DGG  |q FAW_PDA_DGG  |x Verlag  |3 Volltext 
966 e |u https://www.degruyter.com/isbn/9780674246010  |l DE-858  |p ZDB-23-DGG  |q FCO_PDA_DGG  |x Verlag  |3 Volltext 
966 e |u https://www.degruyter.com/isbn/9780674246010  |l DE-Aug4  |p ZDB-23-DGG  |q FHA_PDA_DGG  |x Verlag  |3 Volltext 
966 e |u https://www.degruyter.com/isbn/9780674246010  |l DE-859  |p ZDB-23-DGG  |q FKE_PDA_DGG  |x Verlag  |3 Volltext 
966 e |u https://www.degruyter.com/isbn/9780674246010  |l DE-860  |p ZDB-23-DGG  |q FLA_PDA_DGG  |x Verlag  |3 Volltext 
966 e |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6119381  |l DE-91  |p ZDB-30-PQE  |q TUM_PDA_PQE_Kauf  |x Aggregator  |3 Volltext 
966 e |u https://www.degruyter.com/isbn/9780674246010  |l DE-473  |p ZDB-23-DGG  |q UBG_PDA_DGG  |x Verlag  |3 Volltext 
966 e |u https://www.degruyter.com/isbn/9780674246010  |l DE-739  |p ZDB-23-DGG  |q UPA_PDA_DGG  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2702986
_version_ 1820802299926151168
any_adam_object
author Buchanan, Ben
author_GND (DE-588)1126122939
author_facet Buchanan, Ben
author_role aut
author_sort Buchanan, Ben
author_variant b b bb
building Verbundindex
bvnumber BV046761000
classification_rvk ST 277
classification_tum DAT 461
DAT 055
collection ZDB-23-DGG
ZDB-30-PQE
ctrlnum (ZDB-23-DGG)9780674246010
(OCoLC)1164653601
(DE-599)BVBBV046761000
dewey-full 005.8/7
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8/7
dewey-search 005.8/7
dewey-sort 15.8 17
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03787nam a2200721zc 4500</leader><controlfield tag="001">BV046761000</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240220 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200615s2020 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674246010</subfield><subfield code="q">PDF</subfield><subfield code="9">978-0-674-24601-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674245983</subfield><subfield code="q">EPUB</subfield><subfield code="9">978-0-674-24598-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674245990</subfield><subfield code="q">MOBI</subfield><subfield code="9">978-0-674-24599-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/9780674246010</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9780674246010</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1164653601</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046761000</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchanan, Ben</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1126122939</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The hacker and the state</subfield><subfield code="b">cyber attacks and the new normal of geopolitics</subfield><subfield code="c">Ben Buchanan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Massachusetts ; London, England</subfield><subfield code="b">Harvard University Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (412 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global contest for geopolitical advantage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Intelligence &amp; Espionage</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geopolitik</subfield><subfield code="0">(DE-588)4156741-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Geopolitik</subfield><subfield code="0">(DE-588)4156741-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-674-98755-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032170536</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6119381</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_PDA_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UBG_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/isbn/9780674246010</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV046761000
illustrated Not Illustrated
indexdate 2024-12-24T08:14:23Z
institution BVB
isbn 9780674246010
9780674245983
9780674245990
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032170536
oclc_num 1164653601
open_access_boolean
owner DE-1046
DE-Aug4
DE-859
DE-860
DE-473
DE-BY-UBG
DE-739
DE-1043
DE-858
DE-91
DE-BY-TUM
owner_facet DE-1046
DE-Aug4
DE-859
DE-860
DE-473
DE-BY-UBG
DE-739
DE-1043
DE-858
DE-91
DE-BY-TUM
physical 1 Online-Ressource (412 Seiten)
psigel ZDB-23-DGG
ZDB-30-PQE
ZDB-23-DGG FAB_PDA_DGG
ZDB-23-DGG FAW_PDA_DGG
ZDB-23-DGG FCO_PDA_DGG
ZDB-23-DGG FHA_PDA_DGG
ZDB-23-DGG FKE_PDA_DGG
ZDB-23-DGG FLA_PDA_DGG
ZDB-30-PQE TUM_PDA_PQE_Kauf
ZDB-23-DGG UBG_PDA_DGG
ZDB-23-DGG UPA_PDA_DGG
publishDate 2020
publishDateSearch 2020
publishDateSort 2020
publisher Harvard University Press
record_format marc
spellingShingle Buchanan, Ben
The hacker and the state cyber attacks and the new normal of geopolitics
POLITICAL SCIENCE / Intelligence & Espionage bisacsh
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Cyberspace Political aspects
Cyberterrorism
Hacking Political aspects
Cyberterrorismus (DE-588)1118882725 gnd
Geopolitik (DE-588)4156741-9 gnd
Information warfare (DE-588)4461975-3 gnd
Cyberattacke (DE-588)1075612675 gnd
subject_GND (DE-588)1118882725
(DE-588)4156741-9
(DE-588)4461975-3
(DE-588)1075612675
title The hacker and the state cyber attacks and the new normal of geopolitics
title_auth The hacker and the state cyber attacks and the new normal of geopolitics
title_exact_search The hacker and the state cyber attacks and the new normal of geopolitics
title_full The hacker and the state cyber attacks and the new normal of geopolitics Ben Buchanan
title_fullStr The hacker and the state cyber attacks and the new normal of geopolitics Ben Buchanan
title_full_unstemmed The hacker and the state cyber attacks and the new normal of geopolitics Ben Buchanan
title_short The hacker and the state
title_sort the hacker and the state cyber attacks and the new normal of geopolitics
title_sub cyber attacks and the new normal of geopolitics
topic POLITICAL SCIENCE / Intelligence & Espionage bisacsh
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Cyberspace Political aspects
Cyberterrorism
Hacking Political aspects
Cyberterrorismus (DE-588)1118882725 gnd
Geopolitik (DE-588)4156741-9 gnd
Information warfare (DE-588)4461975-3 gnd
Cyberattacke (DE-588)1075612675 gnd
topic_facet POLITICAL SCIENCE / Intelligence & Espionage
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Cyberspace Political aspects
Cyberterrorism
Hacking Political aspects
Cyberterrorismus
Geopolitik
Information warfare
Cyberattacke
url https://www.degruyter.com/isbn/9780674246010
work_keys_str_mv AT buchananben thehackerandthestatecyberattacksandthenewnormalofgeopolitics