Inside cyber warfare

"You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and ec...

Full description

Bibliographic Details
Main Author: Carr, Jeffrey
Other Authors: Shepherd, Lewis
Format: eBook
Language:English
Published: Sebastopol, Calif. O'Reilly Media, Inc. 2010
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04374nmm a2200781 u 4500
001 EB001926406
003 EBX01000000000000001089308
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1449382991 
020 |a 1449389171 
020 |a 1449325459 
020 |a 9781449325459 
020 |a 9781449382995 
020 |a 9781449377229 
020 |a 144937722X 
020 |a 9781449389178 
050 4 |a HV6773 
100 1 |a Carr, Jeffrey 
245 0 0 |a Inside cyber warfare  |c Jeffrey Carr ; foreword by Lewis Shepherd 
260 |a Sebastopol, Calif.  |b O'Reilly Media, Inc.  |c 2010 
300 |a 1 online resource  |b illustrations, maps 
505 0 |a Includes bibliographical references and index 
505 0 |a Assessing the problem -- The rise of the non-state hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Non-state hackers and the social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policy makers from the field -- Afterword 
653 |a Computersicherheit / gnd 
653 |a Criminalité informatique 
653 |a Terrorismus / gnd / http://d-nb.info/gnd/4059534-1 
653 |a Cyberterrorism / fast 
653 |a Computer crimes / fast 
653 |a Terrorism / blmlsh 
653 |a terrorism / aat 
653 |a Computer crimes / blmlsh 
653 |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism / bisacsh 
653 |a Terrorism / http://id.loc.gov/authorities/subjects/sh85134112 
653 |a Computer crimes / http://id.loc.gov/authorities/subjects/sh85029492 
653 |a Cyberterrorism / blmlsh 
653 |a Guerre de l'information 
653 |a Cyberterrorisme 
653 |a Information warfare / blmlsh 
653 |a Information warfare / gnd / http://d-nb.info/gnd/4461975-3 
653 |a Computer security / sears 
653 |a Computer crimes / sears 
653 |a Information warfare / http://id.loc.gov/authorities/subjects/sh95005481 
653 |a Terrorism / fast 
653 |a Databrott / sao 
653 |a Cyberterrorism / http://id.loc.gov/authorities/subjects/sh00001974 
653 |a Terrorism / sao 
653 |a Terrorisme 
653 |a Society / eflch 
653 |a Computerkriminalität / gnd 
653 |a Information warfare / fast 
700 1 |a Shepherd, Lewis 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
015 |a GBA986688 
776 |z 9780596802158 
776 |z 1449382991 
776 |z 9781449389178 
776 |z 9781449382995 
776 |z 0596802153 
776 |z 1449389171 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781449377229/?ar  |x Verlag  |3 Volltext 
082 0 |a 303.625 
082 0 |a 500 
082 0 |a 364.1 
520 |a "You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009. Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine; discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations; read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival; find out why many attacks originate from servers in the United States, and who's responsible; and, learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level"--Back cover