|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
1015136664 |
003 |
DE-627 |
005 |
20230928120846.0 |
007 |
tu |
008 |
180226s2018 xxk||||| 00| ||eng c |
016 |
7 |
|
|a GBB7L5454
|2 UK
|
020 |
|
|
|a 9781107566866
|c pbk. : £22.99
|9 978-1-107-56686-6
|
020 |
|
|
|a 9781107127609
|c hbk. : £67.99
|9 978-1-107-12760-9
|
035 |
|
|
|a (DE-627)1015136664
|
035 |
|
|
|a (DE-576)50019503X
|
035 |
|
|
|a (DE-599)GBV1015136664
|
035 |
|
|
|a (OCoLC)1026490903
|
035 |
|
|
|a (BL)018608098
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-GB
|c XD-US
|c XE-AU
|c XB-IN
|c XB-SG
|
082 |
0 |
|
|a 327.102854678
|
084 |
|
|
|a RQ
|2 fivr
|
084 |
|
|
|a SC
|2 fivs
|
084 |
|
|
|a SI03.02
|2 fivs
|
084 |
|
|
|a 2,1
|2 ssgn
|
084 |
|
|
|a MF 9500
|q DE-16-160
|2 rvk
|0 (DE-625)rvk/122811:
|
084 |
|
|
|a 89.79
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Maurer, Tim
|d 1984-
|e VerfasserIn
|0 (DE-588)1155509897
|0 (DE-627)1017776210
|0 (DE-576)501693335
|4 aut
|
109 |
|
|
|a Maurer, Tim 1984-
|
245 |
1 |
0 |
|a Cyber mercenaries
|b the state, hackers, and power
|c Tim Maurer, Carnegie Endowment for International Peace
|
264 |
|
1 |
|a Cambridge
|a New York, NY
|a Port Melbourne
|a New Delhi
|a Singapore
|b Cambridge University Press
|c 2018
|
300 |
|
|
|a xx, 246 Seiten
|b Illustrationen
|c 23 cm
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
520 |
|
|
|a Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics
|
650 |
|
0 |
|a Cyberterrorism
|
650 |
|
0 |
|a Cyberspace
|x Political aspects
|
650 |
|
0 |
|a Hacking
|x Political aspects
|
650 |
|
0 |
|a Internet and international relations
|
650 |
|
0 |
|a Technology and international relations
|
650 |
0 |
7 |
|0 (DE-588)4164679-4
|0 (DE-627)104330716
|0 (DE-576)209890088
|a Kollektive Sicherheit
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4026926-7
|0 (DE-627)106286609
|0 (DE-576)208968547
|a Informationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4031888-6
|0 (DE-627)106263714
|0 (DE-576)208994688
|a Kommunikationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4010452-7
|0 (DE-627)106357816
|0 (DE-576)208888128
|a Computerkriminalität
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4461975-3
|0 (DE-627)230760716
|0 (DE-576)212626051
|a Information warfare
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)7668529-9
|0 (DE-627)606174591
|0 (DE-576)309418054
|a Bedrohungsvorstellung
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4113821-1
|0 (DE-627)105826642
|0 (DE-576)209479604
|a Hacker
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4298384-8
|0 (DE-627)104133724
|0 (DE-576)211009512
|a Bevölkerungsgruppe
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4056618-3
|0 (DE-627)106154303
|0 (DE-576)209118288
|a Staat
|2 gnd
|
650 |
|
4 |
|a Cyberterrorism
|
650 |
|
4 |
|a Internet and international relations
|
650 |
|
4 |
|a Technology and international relations
|
650 |
|
4 |
|a Cyberspace
|
650 |
|
4 |
|a Cyberterrorism
|
650 |
|
4 |
|a Hacking
|
650 |
|
4 |
|a Internet and international relations
|
650 |
|
4 |
|a Technology and international relations
|
651 |
|
7 |
|0 (DE-588)4078704-7
|0 (DE-627)106076612
|0 (DE-576)209209682
|a Usa
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4027653-3
|0 (DE-627)106283960
|0 (DE-576)208971645
|a Iran
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4058794-0
|0 (DE-627)104584882
|0 (DE-576)209127961
|a Syrien
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4076899-5
|0 (DE-627)104251980
|0 (DE-576)209203366
|a Russland
|2 gnd
|
651 |
|
7 |
|0 (DE-588)4009937-4
|0 (DE-627)104289031
|0 (DE-576)208885382
|a China
|2 gnd
|
776 |
0 |
8 |
|i Erscheint auch als
|n Online-Ausgabe
|a Maurer, Tim, 1984 -
|t Cyber mercenaries
|d Cambridge : Cambridge University Press, 2017
|h 1 Online-Ressource (xx, 246 pages)
|w (DE-627)1015105874
|z 9781316422724
|
787 |
0 |
8 |
|i Rezensiert in
|a Grasso, Costantino
|t [Rezension von: Maurer, Tim, 1984-, Cyber mercenaries]
|d 2023
|w (DE-627)1859193463
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz1015136664inh.htm
|m V:DE-576;B:DE-Frei85
|q application/pdf
|v 20200422192613
|3 Inhaltsverzeichnis
|
935 |
|
|
|i Blocktest
|
936 |
r |
v |
|a MF 9500
|b Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)
|k Politische Systeme: einzelne Elemente
|k Politische Sachgebiete
|k Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)
|0 (DE-627)1271205475
|0 (DE-625)rvk/122811:
|0 (DE-576)201205475
|
936 |
b |
k |
|a 89.79
|j Internationale Konflikte: Sonstiges
|0 (DE-627)106413732
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|0 (DE-627)106418866
|
936 |
f |
i |
|0 (DE-627)1756134707
|a RQ
|b Weltweit
|k Weltweit
|2 fivr
|
936 |
f |
i |
|0 (DE-627)1756135363
|a SC
|b Internationale Sicherheit/Verteidigung
|k Internationale Sicherheit/Verteidigung
|2 fivs
|
936 |
f |
i |
|0 (DE-627)1756136386
|a SI03.02
|b Informationstechnologie
|k Technik
|k Technikzweige
|k Informationstechnologie
|2 fivs
|
938 |
1 |
0 |
|0 (DE-627)1756233098
|0 (DE-615)800178410
|a Internationale Sicherheit
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756170568
|0 (DE-615)800000398
|a Informations-/Kommunikationstechnologie
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756193525
|0 (DE-615)800238442
|a Computerkriminalität
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756194688
|0 (DE-615)800441760
|a Informationskriegführung
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756207607
|0 (DE-615)800283665
|a Bedrohungsvorstellungen (Sicherheitspolitik)
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)175613944X
|0 (DE-615)T0000000235
|a Hacken/Hacker
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756193207
|0 (DE-615)800677484
|a Verhältnis Bevölkerungsgruppen - Staat
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756179751
|0 (DE-615)800065162
|a Länderbezogene Beiträge
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756241724
|0 (DE-615)800019592
|a Vereinigte Staaten
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)175616259X
|0 (DE-615)800277167
|a Iran
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756146896
|0 (DE-615)800558401
|a Syrien
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756224358
|0 (DE-615)800207939
|a Russische Föderation
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756162107
|0 (DE-615)800352501
|a Volksrepublik China
|2 fivt
|
938 |
1 |
1 |
|0 (DE-627)1756235201
|0 (DE-615)800113858
|a Informationssicherheit
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)1756166404
|0 (DE-615)800426437
|a Datensicherheit
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)1756165912
|0 (DE-615)800319530
|a Privates Sicherheitsunternehmen
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)1756206775
|0 (DE-615)800221201
|a Geopolitik
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)1756202966
|0 (DE-615)800139462
|a Menschenrechte
|2 fiva
|
951 |
|
|
|a BO
|
ELC |
|
|
|b 1
|
LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
LOK |
|
|
|0 001 3526285497
|
LOK |
|
|
|0 003 DE-627
|
LOK |
|
|
|0 004 1015136664
|
LOK |
|
|
|0 005 20200225104222
|
LOK |
|
|
|0 008 191023||||||||||||||||ger|||||||
|
LOK |
|
|
|0 040
|a DE-Frei85
|c DE-627
|d DE-Frei85
|
LOK |
|
|
|0 852
|a DE-Frei85
|
LOK |
|
|
|0 852 1
|m p
|9 00
|
LOK |
|
|
|0 938
|k p
|
ORI |
|
|
|a SA-MARC-krimdoka001.raw
|