skip to content
Inside cyber warfare Preview this item
ClosePreview this item
Checking...

Inside cyber warfare

Author: Jeffrey Carr
Publisher: Beijing ; Sebastopol, CA : O'Reilly, ©2012.
Edition/Format:   Print book : English : 2nd edView all editions and formats
Database:WorldCat
Summary:
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a glimpse into modern cyber warfare without truly realizing the scope of this global conflict. Inside Cyber Warfare provides details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Jeffrey Carr
ISBN: 9781449310042 1449310044
OCLC Number: 774147707
Notes: "Mapping the cyber underworld"--Cover.
Description: xviii, 294 pages : illustrations, maps ; 24 cm
Contents: Assessing the problem --
The rise of the nonstate hacker --
The legal status of cyber warfare --
Responding to international cyber attacks as acts of war --
The intelligence component to cyber warfare --
Nonstate hackers and the social web --
Follow the money --
Organized crime in cyberspace --
Investigating attribution --
Weaponizing malware --
The role of cyber in military doctrine --
A cyber early warning model --
Advice for policymakers from the field --
Conducting operations in the cyber-space-time continuum --
The Russian Federation: Information warfare framework --
Cyber warfare capabilities by nation-state --
U.S. Department of Defense Cyber Command and organizational structure --
Active defense for cyber: A legal framework for covert countermeasures.
Responsibility: Jeffrey Carr.

Abstract:

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a glimpse into modern cyber warfare without truly realizing the scope of this global conflict. Inside Cyber Warfare provides details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Discover how Russian investment in social networks benefits the Kremlin. Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa. Explore the rise of anarchist groups such as Anonymous and LulzSec. Look inside cyber warfare capabilities of nations including China and Israel. Understand how the U.S. can legally engage in covert cyber operations. Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(4)

User lists with this item (1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/774147707> # Inside cyber warfare
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "774147707" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/369486259#Place/beijing> ; # Beijing
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cc> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/369486259#Place/sebastopol_ca> ; # Sebastopol, CA
   schema:about <http://dewey.info/class/363.25968/e23/> ;
   schema:about <http://id.worldcat.org/fast/872063> ; # Computer crimes
   schema:about <http://id.worldcat.org/fast/885802> ; # Cyberterrorism
   schema:about <http://id.worldcat.org/fast/1148101> ; # Terrorism
   schema:about <http://id.worldcat.org/fast/973186> ; # Information warfare
   schema:bookEdition "2nd ed." ;
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2012" ;
   schema:creator <http://viaf.org/viaf/121229943> ; # Jeffrey Carr
   schema:datePublished "2012" ;
   schema:description "When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a glimpse into modern cyber warfare without truly realizing the scope of this global conflict. Inside Cyber Warfare provides details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Discover how Russian investment in social networks benefits the Kremlin. Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa. Explore the rise of anarchist groups such as Anonymous and LulzSec. Look inside cyber warfare capabilities of nations including China and Israel. Understand how the U.S. can legally engage in covert cyber operations. Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations."@en ;
   schema:description "Assessing the problem -- The rise of the nonstate hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Nonstate hackers and the social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policymakers from the field -- Conducting operations in the cyber-space-time continuum -- The Russian Federation: Information warfare framework -- Cyber warfare capabilities by nation-state -- U.S. Department of Defense Cyber Command and organizational structure -- Active defense for cyber: A legal framework for covert countermeasures."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/369486259> ;
   schema:inLanguage "en" ;
   schema:name "Inside cyber warfare"@en ;
   schema:productID "774147707" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/774147707#PublicationEvent/beijing_sebastopol_ca_o_reilly_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/369486259#Agent/o_reilly> ; # O'Reilly
   schema:workExample <http://worldcat.org/isbn/9781449310042> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/774147707> ;
    .


Related Entities

<http://id.worldcat.org/fast/1148101> # Terrorism
    a schema:Intangible ;
   schema:name "Terrorism"@en ;
    .

<http://id.worldcat.org/fast/872063> # Computer crimes
    a schema:Intangible ;
   schema:name "Computer crimes"@en ;
    .

<http://id.worldcat.org/fast/885802> # Cyberterrorism
    a schema:Intangible ;
   schema:name "Cyberterrorism"@en ;
    .

<http://id.worldcat.org/fast/973186> # Information warfare
    a schema:Intangible ;
   schema:name "Information warfare"@en ;
    .

<http://viaf.org/viaf/121229943> # Jeffrey Carr
    a schema:Person ;
   schema:familyName "Carr" ;
   schema:givenName "Jeffrey" ;
   schema:name "Jeffrey Carr" ;
    .

<http://worldcat.org/isbn/9781449310042>
    a schema:ProductModel ;
   schema:isbn "1449310044" ;
   schema:isbn "9781449310042" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.