The Resource Encyclopedia of cyber warfare, Paul J. Springer, editor

Encyclopedia of cyber warfare, Paul J. Springer, editor

Label
Encyclopedia of cyber warfare
Title
Encyclopedia of cyber warfare
Statement of responsibility
Paul J. Springer, editor
Contributor
Editor
Subject
Genre
Language
eng
Summary
This resource provides a complete overview of cyber warfare, which has been used with increasing frequency in recent years by such countries as China, Iran, Israel, North Korea, Russia, and the United States. Readers will gain an understanding of the origins and development of cyber warfare and of how it has become a major strategic element in warfare for countries throughout the world
Member of
Cataloging source
NhCcYBP
Index
index present
LC call number
U163
LC item number
.E45 2017
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Springer, Paul J.
  • ProQuest (Firm)
Series statement
Gale virtual reference library
http://library.link/vocab/subjectName
  • Cyberspace operations (Military science)
  • Cyberterrorism
Label
Encyclopedia of cyber warfare, Paul J. Springer, editor
Instantiates
Publication
Copyright
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing
  • Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA)
  • Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker
  • HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L
  • Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST)
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9781440844256
Lccn
2017002115
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
Stock number
  • 99979474552
  • BC2E146E-AB3D-4393-9B66-8ED1EC95BD50
System control number
(DLC)14643235
Label
Encyclopedia of cyber warfare, Paul J. Springer, editor
Publication
Copyright
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing
  • Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA)
  • Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker
  • HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L
  • Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST)
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9781440844256
Lccn
2017002115
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
Stock number
  • 99979474552
  • BC2E146E-AB3D-4393-9B66-8ED1EC95BD50
System control number
(DLC)14643235

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...