Coverart for item
The Resource Cyber warfare : a reference handbook, Paul J. Springer

Cyber warfare : a reference handbook, Paul J. Springer

Label
Cyber warfare : a reference handbook
Title
Cyber warfare
Title remainder
a reference handbook
Statement of responsibility
Paul J. Springer
Title variation
Cyberwarfare, a reference handbook
Creator
Author
Subject
Language
eng
Summary
"Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This essential reference--the only one of its kind to include an overview of other cyber warfare literature--emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers."--Publisher website
Member of
Cataloging source
DLC
http://library.link/vocab/creatorName
Springer, Paul J
Dewey number
355.4
Illustrations
illustrations
Index
index present
LC call number
U163
LC item number
.S66 2015
Literary form
non fiction
Nature of contents
bibliography
Series statement
Contemporary world issues
http://library.link/vocab/subjectName
  • Cyberspace operations (Military science)
  • Cyberspace
  • Cyberterrorism
  • Computer crimes
  • Cyberspace
  • Cyberterrorism
  • Databrott
Label
Cyber warfare : a reference handbook, Paul J. Springer
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology
  • :1. Background and history. Information as a tool of war ; The role of communications in modern warfare ; Early attempts at encryption ; Direct observation techniques ; The creation of cyberspace ; The cyber attacks begin ; Cyber enabling in the nuclear Middle East ; Preparations for infrastructure cyber attacks ; Russian hacktivists and national pride ; The Chinese approact to irregular warfare ; The current state of cyber war -- 2. Problems, controversies, and solutions : Is a cyber war possible? ; Cyber as a military domain ; Cyber strategy ; Instruments of national power ; Cyber crime, cyber espionage, cyberterrorism ; The problem of attribution ; People and paranoia ; Cyber ethics -- 3. Perspectives : Escalation in cyberspace: Martin Libicki ; Training tomorrow's cyber warriors: Nicholas Michael Sambaluk ; Cyber warfare in the professional military education system: S. Michael Pavelec ; Waging e-jihad: Heidi L. Dexter ; The relationship between space and cyber assets: Brian Tannehill -- 4. Profiles. :Alexander, Keith B. ; Alperovitch, Dmitri ; Anonymous ; Carpenter, Shawn ; Carr, Jeffrey ; Clarke, Richard Alan ; Defense Advanced Research Projects Agency (DARPA) ; Defense Information Systems Agency (U.S.) ; FireEye, Inc. ; Google, Inc. ; Hayden, Michael ; Kaspersky, Yevgeniy "Eugene" Valentinovich ; Libicki, Martin ; Mandiant ; McAfee, Inc. ; Microsoft Corporation ; Mitnick, Kevin ; National Security Agency ; NATO Cooperative Cyber Defence Centre of Excellence ; People's Liberation Army Unit 61398 (China) ; Qiao Liang and Wang Xiangsui ; RAND Corporation ; Rogers, Michael S. ; Russian Business Network (RBN) ; Snowden, Edward ; Symantec Corporation ; Syrian Electronic Army ; Tenenbaum, Ehud "Udi" ; U.S. Cyber Command ; WikiLeaks -- 5. Documents : Excerpts from the North Atlantic Treaty (1949) ; Remarks of President Barack Obama on securing the nation's cyber infrastructure, Washington, D.C., May 29, 2009 ; Excerpts of Secretary of State Hillary Clinton on Internet freedom, Washington, D.C., January 21, 2010 ; Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010 ; Excerpts of "International Strategy for Cyberspace," May 2011 ; Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012 ; Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: "Resilient military systems and the advanced cyber threat," January 2013 ; Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013 -- 7. Chronology
Control code
ocn881439869
Dimensions
24 cm.
Extent
xvi, 340 pages
Isbn
9781610694438
Lccn
2014038753
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
  • (Sirsi) o881439869
  • (OCoLC)881439869
Label
Cyber warfare : a reference handbook, Paul J. Springer
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology
  • :1. Background and history. Information as a tool of war ; The role of communications in modern warfare ; Early attempts at encryption ; Direct observation techniques ; The creation of cyberspace ; The cyber attacks begin ; Cyber enabling in the nuclear Middle East ; Preparations for infrastructure cyber attacks ; Russian hacktivists and national pride ; The Chinese approact to irregular warfare ; The current state of cyber war -- 2. Problems, controversies, and solutions : Is a cyber war possible? ; Cyber as a military domain ; Cyber strategy ; Instruments of national power ; Cyber crime, cyber espionage, cyberterrorism ; The problem of attribution ; People and paranoia ; Cyber ethics -- 3. Perspectives : Escalation in cyberspace: Martin Libicki ; Training tomorrow's cyber warriors: Nicholas Michael Sambaluk ; Cyber warfare in the professional military education system: S. Michael Pavelec ; Waging e-jihad: Heidi L. Dexter ; The relationship between space and cyber assets: Brian Tannehill -- 4. Profiles. :Alexander, Keith B. ; Alperovitch, Dmitri ; Anonymous ; Carpenter, Shawn ; Carr, Jeffrey ; Clarke, Richard Alan ; Defense Advanced Research Projects Agency (DARPA) ; Defense Information Systems Agency (U.S.) ; FireEye, Inc. ; Google, Inc. ; Hayden, Michael ; Kaspersky, Yevgeniy "Eugene" Valentinovich ; Libicki, Martin ; Mandiant ; McAfee, Inc. ; Microsoft Corporation ; Mitnick, Kevin ; National Security Agency ; NATO Cooperative Cyber Defence Centre of Excellence ; People's Liberation Army Unit 61398 (China) ; Qiao Liang and Wang Xiangsui ; RAND Corporation ; Rogers, Michael S. ; Russian Business Network (RBN) ; Snowden, Edward ; Symantec Corporation ; Syrian Electronic Army ; Tenenbaum, Ehud "Udi" ; U.S. Cyber Command ; WikiLeaks -- 5. Documents : Excerpts from the North Atlantic Treaty (1949) ; Remarks of President Barack Obama on securing the nation's cyber infrastructure, Washington, D.C., May 29, 2009 ; Excerpts of Secretary of State Hillary Clinton on Internet freedom, Washington, D.C., January 21, 2010 ; Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010 ; Excerpts of "International Strategy for Cyberspace," May 2011 ; Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012 ; Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: "Resilient military systems and the advanced cyber threat," January 2013 ; Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013 -- 7. Chronology
Control code
ocn881439869
Dimensions
24 cm.
Extent
xvi, 340 pages
Isbn
9781610694438
Lccn
2014038753
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
  • (Sirsi) o881439869
  • (OCoLC)881439869

Library Locations

    • Waubonsee: Aurora Downtown CampusBorrow it
      1st Floor 18 S. River St., Aurora, IL, 60506-4178, US
      41.7587304 -88.3172925
    • Waubonsee: Sugar Grove Campus - Todd LibraryBorrow it
      Collins Hall 2nd Floor Waubonsee Community College Route 47 at Waubonsee Drive, Sugar Grove, IL, 60554-9454, US
      41.7974 -88.45785
Processing Feedback ...