Cyber mercenaries: the state, hackers, and power

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries...

Full description

Saved in:  
Bibliographic Details
Main Author: Maurer, Tim 1984- (Author)
Format: Electronic Book
Language:English
Published: Cambridge Cambridge University Press December 2017
In:Year: 2017
Online Access: Volltext (lizenzpflichtig)
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:
Related Items:Erscheint auch als: 1015136664

MARC

LEADER 00000cam a2200000 4500
001 1015105874
003 DE-627
005 20240229092054.0
007 cr uuu---uuuuu
008 180124s2017 xxk|||||o 00| ||eng c
020 |a 9781316422724  |c  : ebook  |9 978-1-316-42272-4 
024 7 |a 10.1017/9781316422724  |2 doi 
035 |a (DE-627)1015105874 
035 |a (DE-599)GBV1015105874 
035 |a (OCoLC)1021396383 
035 |a (CUP)CR9781316422724 
035 |a (EBP)051627558 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
044 |c XA-GB 
050 0 |a HV6773 
082 0 |a 364.16/8  |2 23 
084 |a 2,1  |2 ssgn 
084 |a MF 9500  |q SEPA  |2 rvk  |0 (DE-625)rvk/122811: 
084 |a 89.79  |2 bkl 
084 |a 54.38  |2 bkl 
100 1 |a Maurer, Tim  |d 1984-  |e VerfasserIn  |0 (DE-588)1155509897  |0 (DE-627)1017776210  |0 (DE-576)501693335  |4 aut 
109 |a Maurer, Tim 1984- 
245 1 0 |a Cyber mercenaries  |b the state, hackers, and power  |c Tim Maurer 
264 1 |a Cambridge  |b Cambridge University Press  |c December 2017 
300 |a 1 Online-Ressource (xx, 246 pages)  |b digital, PDF file(s) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Title from publisher's bibliographic system (viewed on 05 Jan 2018) 
520 |a Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics 
650 0 |a Computer crimes 
650 0 7 |0 (DE-588)4164679-4  |0 (DE-627)104330716  |0 (DE-576)209890088  |a Kollektive Sicherheit  |2 gnd 
650 0 7 |0 (DE-588)4026926-7  |0 (DE-627)106286609  |0 (DE-576)208968547  |a Informationstechnik  |2 gnd 
650 0 7 |0 (DE-588)4031888-6  |0 (DE-627)106263714  |0 (DE-576)208994688  |a Kommunikationstechnik  |2 gnd 
650 0 7 |0 (DE-588)4010452-7  |0 (DE-627)106357816  |0 (DE-576)208888128  |a Computerkriminalität  |2 gnd 
650 0 7 |0 (DE-588)4461975-3  |0 (DE-627)230760716  |0 (DE-576)212626051  |a Information warfare  |2 gnd 
650 0 7 |0 (DE-588)7668529-9  |0 (DE-627)606174591  |0 (DE-576)309418054  |a Bedrohungsvorstellung  |2 gnd 
650 0 7 |0 (DE-588)4113821-1  |0 (DE-627)105826642  |0 (DE-576)209479604  |a Hacker  |2 gnd 
650 0 7 |0 (DE-588)4298384-8  |0 (DE-627)104133724  |0 (DE-576)211009512  |a Bevölkerungsgruppe  |2 gnd 
650 0 7 |0 (DE-588)4056618-3  |0 (DE-627)106154303  |0 (DE-576)209118288  |a Staat  |2 gnd 
650 4 |a Computer crimes 
650 4 |a Cyberspace 
650 4 |a Hacking 
651 7 |0 (DE-588)4078704-7  |0 (DE-627)106076612  |0 (DE-576)209209682  |a Usa  |2 gnd 
651 7 |0 (DE-588)4027653-3  |0 (DE-627)106283960  |0 (DE-576)208971645  |a Iran  |2 gnd 
651 7 |0 (DE-588)4058794-0  |0 (DE-627)104584882  |0 (DE-576)209127961  |a Syrien  |2 gnd 
651 7 |0 (DE-588)4076899-5  |0 (DE-627)104251980  |0 (DE-576)209203366  |a Russland  |2 gnd 
651 7 |0 (DE-588)4009937-4  |0 (DE-627)104289031  |0 (DE-576)208885382  |a China  |2 gnd 
776 1 |z 9781107127609  |c  : hardback 
776 1 |z 9781107566866  |c  : paperback 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Maurer, Tim, 1984 -   |t Cyber mercenaries  |d Cambridge : Cambridge University Press, 2018  |h xx, 246 Seiten  |w (DE-627)1015136664  |w (DE-576)50019503X  |z 9781107566866  |z 9781107127609 
787 0 8 |i Rezensiert in  |a Grasso, Costantino  |t [Rezension von: Maurer, Tim, 1984-, Cyber mercenaries]  |d 2023  |w (DE-627)1859193463 
856 4 0 |u https://doi.org/10.1017/9781316422724  |m X:CUP  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-20-CBO 
912 |a ZDB-20-CHS 
912 |a ZDB-20-CBL 
936 r v |a MF 9500  |b Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)  |k Politologie  |k Politische Systeme: einzelne Elemente  |k Politische Sachgebiete  |k Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)  |0 (DE-627)1271205475  |0 (DE-625)rvk/122811:  |0 (DE-576)201205475 
936 b k |a 89.79  |j Internationale Konflikte: Sonstiges  |q SEPA  |0 (DE-627)106413732 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4446977318 
LOK |0 003 DE-627 
LOK |0 004 1015105874 
LOK |0 005 20240103203032 
LOK |0 008 240103||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 092   |o k  |p p 
LOK |0 689   |a s  |a eBook-Cambridge-Gesamt-EBA-2024 
LOK |0 852   |a DE-21 
LOK |0 852 1  |9 00 
LOK |0 85640  |u https://doi.org/10.1017/9781316422724  |z Zugang für die Universität Tübingen 
LOK |0 912   |a ZDB-20-CBO 
LOK |0 935   |a ebok  |a lbok 
ORI |a WA-MARC-krimdoka001.raw