Waubonsee Community College

Cyber warfare, a reference handbook, Paul J. Springer

Label
Cyber warfare, a reference handbook, Paul J. Springer
Language
eng
Bibliography note
Includes bibliographical references and index
Illustrations
illustrations
Index
index present
Literary Form
non fiction
Main title
Cyber warfare
Nature of contents
bibliography
Oclc number
881439869
Responsibility statement
Paul J. Springer
Series statement
Contemporary world issues
Sub title
a reference handbook
Summary
"Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This essential reference--the only one of its kind to include an overview of other cyber warfare literature--emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers."--Publisher website
Table Of Contents
Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology:1. Background and history. Information as a tool of war ; The role of communications in modern warfare ; Early attempts at encryption ; Direct observation techniques ; The creation of cyberspace ; The cyber attacks begin ; Cyber enabling in the nuclear Middle East ; Preparations for infrastructure cyber attacks ; Russian hacktivists and national pride ; The Chinese approact to irregular warfare ; The current state of cyber war -- 2. Problems, controversies, and solutions : Is a cyber war possible? ; Cyber as a military domain ; Cyber strategy ; Instruments of national power ; Cyber crime, cyber espionage, cyberterrorism ; The problem of attribution ; People and paranoia ; Cyber ethics -- 3. Perspectives : Escalation in cyberspace: Martin Libicki ; Training tomorrow's cyber warriors: Nicholas Michael Sambaluk ; Cyber warfare in the professional military education system: S. Michael Pavelec ; Waging e-jihad: Heidi L. Dexter ; The relationship between space and cyber assets: Brian Tannehill -- 4. Profiles. :Alexander, Keith B. ; Alperovitch, Dmitri ; Anonymous ; Carpenter, Shawn ; Carr, Jeffrey ; Clarke, Richard Alan ; Defense Advanced Research Projects Agency (DARPA) ; Defense Information Systems Agency (U.S.) ; FireEye, Inc. ; Google, Inc. ; Hayden, Michael ; Kaspersky, Yevgeniy "Eugene" Valentinovich ; Libicki, Martin ; Mandiant ; McAfee, Inc. ; Microsoft Corporation ; Mitnick, Kevin ; National Security Agency ; NATO Cooperative Cyber Defence Centre of Excellence ; People's Liberation Army Unit 61398 (China) ; Qiao Liang and Wang Xiangsui ; RAND Corporation ; Rogers, Michael S. ; Russian Business Network (RBN) ; Snowden, Edward ; Symantec Corporation ; Syrian Electronic Army ; Tenenbaum, Ehud "Udi" ; U.S. Cyber Command ; WikiLeaks -- 5. Documents : Excerpts from the North Atlantic Treaty (1949) ; Remarks of President Barack Obama on securing the nation's cyber infrastructure, Washington, D.C., May 29, 2009 ; Excerpts of Secretary of State Hillary Clinton on Internet freedom, Washington, D.C., January 21, 2010 ; Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010 ; Excerpts of "International Strategy for Cyberspace," May 2011 ; Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012 ; Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: "Resilient military systems and the advanced cyber threat," January 2013 ; Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013 -- 7. Chronology
resource.variantTitle
Cyberwarfare, a reference handbook
Classification
Content
Mapped to

Incoming Resources