000 | 02178cam a2200361 i 4500 | ||
---|---|---|---|
001 | 136690 | ||
003 | 0000000000 | ||
005 | 20250408094743.0 | ||
006 | s r n 0 0 | ||
008 | 210511s2023 mauab b 001 0 eng | ||
010 | _a 2021013019 | ||
020 | _a9781284225440 | ||
035 | _a22031875 | ||
040 |
_aDLC _beng _erda _cDLC _dDLC |
||
082 | 0 |
_a355.4/1 _223 |
|
100 | 1 |
_aChapple, Mike, _e1975-, _eauthor. |
|
245 | 0 | 0 |
_aCyberwarfare : _binformation operations in a connected world / _cMike Chapple, David Seidl. |
250 | _aSecond edition. | ||
264 | 1 |
_aBurlington, Massachusetts : _bJones & Bartlett Learning, _c[2023] |
|
300 |
_axxiii, 428 pages : _billustrations, maps ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
500 | _aIncludes index and bibliographical references. | ||
504 | _aIncludes bibliographical referenecs (pages 399-414) and index. | ||
505 | 0 | _aInformation as a Military Asset -- Targets and Combatants -- Cyberwarfare, Law, and Ethics -- Intelligence Operations in a Connected World -- The Evolving Threat: From Script Kiddies to Advanced Attackers -- Social Engineering and Cyberwarfare -- Weaponizing Cyberspace: A History -- Nonstate Actors in Cyberwar -- Defense-in-Depth Strategies -- Cryptography and Cyberwar -- Defending Endpoints -- Defending Networks -- Defending Data -- Cyberwarfare and Military Doctrine -- Pandora's Box: The Future of Cyberwarfare. | |
520 |
_a"Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations-operations in which it has become almost impossible to separate cyberwarfare from traditional warfare"-- _cProvided by publisher. |
||
650 | 1 | 0 | _aComputer security. |
650 | 1 | 0 | _aCyberspace operations (Military science) |
650 | 1 | 0 | _aInformation warfare. |
700 | 1 |
_aSeidl, David, _eauthor. |
|
999 |
_c16667 _d16667 |