Navigation überspringen
Universitätsbibliothek Heidelberg
Status: Präsenznutzung
Signatur: WS/MF 9500 P451   QR-Code
Standort: Campusbibliothek Bergheim / Präsenznutzung
Exemplare: siehe unten
Titel:Understanding cyber conflict
Titelzusatz:14 analogies
Mitwirkende:Perkovich, George [HerausgeberIn]   i
 Levite, Ariel [HerausgeberIn]   i
Verf.angabe:George Perkovich, Ariel E. Levite, editors
Verlagsort:Washington, DC
Verlag:Georgetown University Press
E-Jahr:2017
Jahr:[2017]
Umfang:viii, 297 Seiten
Format:26 cm
Fussnoten:Literaturhinweise, Register
Ang. zum Inhalt:Intelligence in cyber; and cyber intelligence / Michael Warner
 Non-lethal weapons and cyber capabilities / Lt. Gen. Robert Schmidle Jr. (USMC, ret.), Michael Sulmeyer, and Ben Buchanan
 Cyber weapons and precision-guided munitions / James M. Acton
 Cyber, drones, and secrecy / David E. Sanger
 Cyber war and information war a la russe / Stephen Blank
 An ounce of (virtual) prevention / John Arquilla
 Crisis instability and preemption : the 1914 railroad analogy / Francis J. Gavin
 Brits-krieg : the strategy of economic warfare / Nicholas Lambert
 Why a digital Pearl Harbor makes sense ... and is possible / Emily O. Goldman and Michael Warner
 Cyber threats, nuclear analogies? / Steven E. Miller
 From Pearl Harbor to "harbor lights" / John Arquilla
 Active cyber defense : applying air defense to the cyber domain / Dorothy E. Denning and Bradley J. Strawser
 Predelegation in nuclear and cyber scenarios / Peter Feaver and Kenneth Geers
 Cybersecurity and the age of privateering / Florian Egloff
ISBN:978-1-62616-498-7
 9781626164994$So
 978-1-62616-497-0
Abstract:Cyber weapons and the possibility of cyber conflict—including interference in foreign political campaigns, industrial sabotage, attacks on infrastructure, and combined military campaigns—require policymakers, scholars, and citizens to rethink twenty-first-century warfare. Yet because cyber capabilities are so new and continually developing, there is little agreement about how they will be deployed, how effective they can be, and how they can be managed. Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first—What Are Cyber Weapons Like?—examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision striking compares with earlier technologies for such missions. The second section—What Might Cyber Wars Be Like?—explores how lessons from several wars since the early nineteenth century, including the World Wars, could apply—or not—to cyber conflict in the twenty-first century. The final section—What Is Preventing and/or Managing Cyber Conflict Like?—offers lessons from past cases of managing threatening actors and technologies.
Schlagwörter:(s)Information warfare   i / (s)Elektronische Kampfführung   i
 (s)Kriegführung   i / (s)Informationstechnik   i / (s)Kommunikationstechnik   i / (s)Information warfare   i / (s)Elektronische Kampfführung   i / (s)Waffe   i / (s)Modernisierung   i / (s)Vergleich   i / (s)Konventioneller Krieg   i
Sprache:eng
RVK-Notation:PZ 4800   i
 MF 9500   i
 PZ 3700   i
 ST 277   i
K10plus-PPN:163670607X
Exemplare:

SignaturQRStandortStatus
WS/MF 9500 P451QR-CodeCampusbibliothek Bergheim / PräsenznutzungPräsenznutzung
Mediennummer: 62377746, Inventarnummer: PO-1900249

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/68421390   QR-Code

zum Seitenanfang