|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
1015105874 |
003 |
DE-627 |
005 |
20240229092054.0 |
007 |
cr uuu---uuuuu |
008 |
180124s2017 xxk|||||o 00| ||eng c |
020 |
|
|
|a 9781316422724
|c : ebook
|9 978-1-316-42272-4
|
024 |
7 |
|
|a 10.1017/9781316422724
|2 doi
|
035 |
|
|
|a (DE-627)1015105874
|
035 |
|
|
|a (DE-599)GBV1015105874
|
035 |
|
|
|a (OCoLC)1021396383
|
035 |
|
|
|a (CUP)CR9781316422724
|
035 |
|
|
|a (EBP)051627558
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-GB
|
050 |
|
0 |
|a HV6773
|
082 |
0 |
|
|a 364.16/8
|2 23
|
084 |
|
|
|a 2,1
|2 ssgn
|
084 |
|
|
|a MF 9500
|q SEPA
|2 rvk
|0 (DE-625)rvk/122811:
|
084 |
|
|
|a 89.79
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Maurer, Tim
|d 1984-
|e VerfasserIn
|0 (DE-588)1155509897
|0 (DE-627)1017776210
|0 (DE-576)501693335
|4 aut
|
109 |
|
|
|a Maurer, Tim 1984-
|
245 |
1 |
0 |
|a Cyber mercenaries
|b the state, hackers, and power
|c Tim Maurer
|
264 |
|
1 |
|a Cambridge
|b Cambridge University Press
|c December 2017
|
300 |
|
|
|a 1 Online-Ressource (xx, 246 pages)
|b digital, PDF file(s)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from publisher's bibliographic system (viewed on 05 Jan 2018)
|
520 |
|
|
|a Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics
|
650 |
|
0 |
|a Computer crimes
|
650 |
0 |
7 |
|0 (DE-588)4164679-4
|0 (DE-627)104330716
|0 (DE-576)209890088
|a Kollektive Sicherheit
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4026926-7
|0 (DE-627)106286609
|0 (DE-576)208968547
|a Informationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4031888-6
|0 (DE-627)106263714
|0 (DE-576)208994688
|a Kommunikationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4010452-7
|0 (DE-627)106357816
|0 (DE-576)208888128
|a Computerkriminalität
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4461975-3
|0 (DE-627)230760716
|0 (DE-576)212626051
|a Information warfare
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)7668529-9
|0 (DE-627)606174591
|0 (DE-576)309418054
|a Bedrohungsvorstellung
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4113821-1
|0 (DE-627)105826642
|0 (DE-576)209479604
|a Hacker
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4298384-8
|0 (DE-627)104133724
|0 (DE-576)211009512
|a Bevölkerungsgruppe
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4056618-3
|0 (DE-627)106154303
|0 (DE-576)209118288
|a Staat
|2 gnd
|
650 |
|
4 |
|a Computer crimes
|
650 |
|
4 |
|a Cyberspace
|
650 |
|
4 |
|a Hacking
|
651 |
|
7 |
|0 (DE-588)4078704-7
|0 (DE-627)106076612
|0 (DE-576)209209682
|a Usa
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4027653-3
|0 (DE-627)106283960
|0 (DE-576)208971645
|a Iran
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4058794-0
|0 (DE-627)104584882
|0 (DE-576)209127961
|a Syrien
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4076899-5
|0 (DE-627)104251980
|0 (DE-576)209203366
|a Russland
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4009937-4
|0 (DE-627)104289031
|0 (DE-576)208885382
|a China
|2 gnd
|
776 |
1 |
|
|z 9781107127609
|c : hardback
|
776 |
1 |
|
|z 9781107566866
|c : paperback
|
776 |
0 |
8 |
|i Erscheint auch als
|n Druck-Ausgabe
|a Maurer, Tim, 1984 -
|t Cyber mercenaries
|d Cambridge : Cambridge University Press, 2018
|h xx, 246 Seiten
|w (DE-627)1015136664
|w (DE-576)50019503X
|z 9781107566866
|z 9781107127609
|
787 |
0 |
8 |
|i Rezensiert in
|a Grasso, Costantino
|t [Rezension von: Maurer, Tim, 1984-, Cyber mercenaries]
|d 2023
|w (DE-627)1859193463
|
856 |
4 |
0 |
|u https://doi.org/10.1017/9781316422724
|m X:CUP
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
912 |
|
|
|a ZDB-20-CBO
|
912 |
|
|
|a ZDB-20-CHS
|
912 |
|
|
|a ZDB-20-CBL
|
936 |
r |
v |
|a MF 9500
|b Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)
|k Politologie
|k Politische Systeme: einzelne Elemente
|k Politische Sachgebiete
|k Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)
|0 (DE-627)1271205475
|0 (DE-625)rvk/122811:
|0 (DE-576)201205475
|
936 |
b |
k |
|a 89.79
|j Internationale Konflikte: Sonstiges
|q SEPA
|0 (DE-627)106413732
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
ELC |
|
|
|a 1
|
LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
LOK |
|
|
|0 001 4446977318
|
LOK |
|
|
|0 003 DE-627
|
LOK |
|
|
|0 004 1015105874
|
LOK |
|
|
|0 005 20240103203032
|
LOK |
|
|
|0 008 240103||||||||||||||||ger|||||||
|
LOK |
|
|
|0 040
|a DE-21
|c DE-627
|d DE-21
|
LOK |
|
|
|0 092
|o k
|p p
|
LOK |
|
|
|0 689
|a s
|a eBook-Cambridge-Gesamt-EBA-2024
|
LOK |
|
|
|0 852
|a DE-21
|
LOK |
|
|
|0 852 1
|9 00
|
LOK |
|
|
|0 85640
|u https://doi.org/10.1017/9781316422724
|z Zugang für die Universität Tübingen
|
LOK |
|
|
|0 912
|a ZDB-20-CBO
|
LOK |
|
|
|0 935
|a ebok
|a lbok
|
ORI |
|
|
|a WA-MARC-krimdoka001.raw
|