It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 08013cam 2200973 i 4500
001 ocn802324804
003 OCoLC
005 20210615183854.0
008 130913s2014 enka b 001 0 eng
007 ta
010 $a 2013028127
040 $aDLC$beng$erda$cDLC$dYDX$dBTCTA$dBDX$dUKMGB$dIAK$dMOF$dTFF$dYDXCP$dFOLLT$dIAD$dZCU$dITD$dILC$dGK8$dCGU$dVP@$dOCLCO$dCLU$dS1C$dAZD$dCDX$dOCLCF$dNDS$dNTAUP$dS3O$dCRH$dAW3$dNLGGC$dOCLCQ$dND@$dSFR$dOCLCQ$dOCLCA$dPBF$dOCLCA$dIOK$dOCL$dOCLCQ$dOCLCO$dBDP$dNQH$dEQK$dOCLCQ$dNLVRD$dZHC
015 $aGBB301524$2bnb
016 7 $a016246323$2Uk
019 $a869519673$a900455168$a936048870$a1201960749
020 $a9780199918096$q(hardcover ;$qacid-free paper)
020 $a0199918090$q(hardcover ;$qacid-free paper)
020 $a9780199918119$q(paperback ;$qacid-free paper)
020 $a0199918112$q(paperback ;$qacid-free paper)
035 $a(OCoLC)802324804$z(OCoLC)869519673$z(OCoLC)900455168$z(OCoLC)936048870$z(OCoLC)1201960749
042 $apcc
043 $an-us---
050 00 $aQA76.9.A25$bS562 2014
055 3 $aQA76.9 A25$bS546
082 00 $a005.8$223
084 $aPOL012000$2bisacsh
100 1 $aSinger, P. W.$q(Peter Warren),$eauthor.
245 10 $aCybersecurity and cyberwar :$bwhat everyone needs to know /$cP.W. Singer and Allan Friedman.
264 1 $aOxford :$bOxford University Press,$c[2014]
264 4 $c©2014
300 $aviii, 306 pages :$billustrations ;$c22 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aWhat everyone needs to know
504 $aIncludes bibliographical references (pages 259-291) and index.
505 0 $aIntroduction -- pt. I. How it all works -- Defining cyberspace -- "Cyber stuff" : a short history of the internet -- Understanding internet governance -- On the internet : identity and authentication -- Security -- What are the threats? -- Phish : vulnerabilities -- WikiLeaks -- What is advanced persistent threat (APT)? -- The basics of computer defense -- Who is the weakest link? : human factors -- pt. II. Why it matters -- What is the meaning of cyberattack? : importance of terms and frameworks -- The problem of attribution -- What is hactivism? -- Who is anonymous? -- What is cybercrime? -- Shady RATs and cyberspies : what is cyber espionage? -- Cyberterrorism -- How do terrorist actually use the web? -- Cyber Counterterrorism -- Security risk or human right? : foreign policy and the internet -- What is Tor and why does peeling back the onion matter? -- Patriotic hackers -- What was Stuxnet? -- The ethics of cyberweapons -- Defining cyberwar -- The legal side of cyber conflict -- What might a "cyberwar" actually look like? : computer network operations -- What is the US Military approach to cyberwar? -- What is the Chinese approach to cyberwar? -- Deterrence in an era of cyberwar -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- What are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Is t here a cyber-industrial complex? -- pt. III. What can we do? -- Why we can't just build a new, more secure internet -- Rethink security : what is resilience -- Re frame the problem : what can we learn from public health? -- What can pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web : what is the role of international institutions? -- "Graft" the rule of law : do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace -- Rethink government's role : how can we better organize for cybersecurity? -- Approach it as public-private problem : how do we better coordinate defense? -- How can we better prepare for cyber incidents? -- Cybersecurity incentives -- How can we better collaborate on information? -- Demand disclosure : what is the role of transparency? -- Accountability for security -- How do we solve the cyber people problem? -- How can I protect myself and the internet? -- Conclusions -- Where is cybersecurity headed next? -- What do I really need to know in the end?
520 $aDependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into U.S. government computer systems by Chinese hackers -- presumably sponsored by the Chinese government -- is another. Together, they point to a new era in the evolution of human conflict. Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They explain what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves.
650 0 $aComputer security$zUnited States.
650 0 $aComputer networks$xSecurity measures$zUnited States.
650 0 $aCyberspace$xSecurity measures$zUnited States.
650 0 $aCyberterrorism$zUnited States$xPrevention.
650 0 $aCyberspace operations (Military science)
650 0 $aInformation warfare$zUnited States$xPrevention.
651 4 $aFörenta staterna.
650 7 $aPOLITICAL SCIENCE$xPolitical Freedom & Security$xInternational Security.$2bisacsh
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aCyberspace operations (Military science)$2fast$0(OCoLC)fst01909446
650 7 $aCyberterrorism$xPrevention.$2fast$0(OCoLC)fst01905567
650 7 $aInformation warfare$xPrevention.$2fast$0(OCoLC)fst00973188
651 7 $aUnited States.$2fast$0(OCoLC)fst01204155
650 17 $aBeveiliging.$2gtt$0(NL-LeOCL)078451183
650 17 $aInternet.$2gtt$0(NL-LeOCL)101068689
650 7 $aUnited States of America.$2pplt
650 7 $aCyberspace.$2pplt
650 7 $aNational security.$2pplt
650 7 $aComputer-related crime.$2pplt
650 7 $aCyberwarfare.$2pplt
650 7 $aInformation and communication technology.$2pplt
650 7 $aIT-säkerhet.$2sao
650 7 $aDatanät$xsäkerhetsaspekter.$2sao
650 7 $aCyberspace$xsäkerhetsaspekter.$2sao
650 7 $aCyberterrorism$xprevention.$2sao
650 7 $aInformationskrigföring.$2sao
650 7 $aIW$xcomputers$xinformation technology$xcommunications$xsecurity$xterrorism$zUSA.$2sipri
700 1 $aFriedman, Allan,$eauthor.
830 0 $aWhat everyone needs to know.
856 41 $uhttp://news.asis.io/sites/default/files/Cybersecurity_and_Cyberwar.pdf
856 42 $uhttp://books.google.com/books?isbn=9780199918096$zAdditional Information at Google Books
938 $aBrodart$bBROD$n103574794
938 $aBaker and Taylor$bBTCP$nBK0011823311
938 $aCoutts Information Services$bCOUT$n22670390
938 $aYBP Library Services$bYANK$n9371560
029 1 $aAU@$b000051982812
029 1 $aNLGGC$b370737318
029 1 $aNLGGC$b387581812
029 1 $aNZ1$b15261629
029 1 $aUKDEL$b128390484
029 1 $aUKMGB$b016246323
029 1 $aUKTLS$b128390484
029 1 $aUNITY$b128390484
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 1156 OTHER HOLDINGS