|
|
|
|
LEADER |
00000cam a2200000 c 4500 |
001 |
1682197468 |
003 |
DE-627 |
005 |
20240801080114.0 |
007 |
tu |
008 |
191120s2020 xxu||||| 00| ||eng c |
010 |
|
|
|a 2019033274
|
020 |
|
|
|a 9780674987555
|c cloth
|9 978-0-674-98755-5
|
020 |
|
|
|a 9780674271029
|c pbk
|9 978-0-674-27102-9
|
035 |
|
|
|a (DE-627)1682197468
|
035 |
|
|
|a (DE-599)KXP1682197468
|
035 |
|
|
|a (OCoLC)1153976735
|
040 |
|
|
|a DE-627
|b eng
|c DE-627
|e rda
|
041 |
|
|
|a eng
|
044 |
|
|
|c XD-US
|c XA-GB
|
050 |
|
0 |
|a QA76.9.A25
|
082 |
0 |
|
|a 005.8/7
|q LOC
|
084 |
|
|
|a RQ
|2 fivr
|
084 |
|
|
|a SI03.02
|2 fivs
|
084 |
|
|
|a SC
|2 fivs
|
084 |
|
|
|a 2,1
|2 ssgn
|
084 |
|
|
|a MF 9500
|q DE-16-160
|2 rvk
|0 (DE-625)rvk/122811:
|
084 |
|
|
|a ST 277
|2 rvk
|0 (DE-625)rvk/143643:
|
084 |
|
|
|a 89.41
|2 bkl
|
084 |
|
|
|a 89.42
|2 bkl
|
084 |
|
|
|a 71.43
|2 bkl
|
084 |
|
|
|a 89.58
|2 bkl
|
100 |
1 |
|
|a Buchanan, Ben
|e VerfasserIn
|0 (DE-588)1126122939
|0 (DE-627)880785209
|0 (DE-576)483739758
|4 aut
|
109 |
|
|
|a Buchanan, Ben
|
245 |
1 |
4 |
|a The hacker and the state
|b cyber attacks and the new normal of geopolitics
|c Ben Buchanan
|
264 |
|
1 |
|a Cambridge, Massachusetts
|a London, England
|b Harvard University Press
|c 2020
|
300 |
|
|
|a 412 Seiten
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
500 |
|
|
|a Literaturhinweise, Register
|
500 |
|
|
|a Hier auch später erschienene, unveränderte Nachdrucke
|
520 |
|
|
|a Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption.
|
520 |
|
|
|a "The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|
650 |
|
0 |
|a Hacking
|x Political aspects
|
650 |
|
0 |
|a Cyberterrorism
|
650 |
|
0 |
|a Cyberspace operations (Military science)
|
650 |
|
0 |
|a Cyberspace
|x Political aspects
|
650 |
0 |
7 |
|0 (DE-588)4266146-8
|0 (DE-627)104567120
|0 (DE-576)210634804
|a Cyberspace
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4026926-7
|0 (DE-627)106286609
|0 (DE-576)208968547
|a Informationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4031888-6
|0 (DE-627)106263714
|0 (DE-576)208994688
|a Kommunikationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4164679-4
|0 (DE-627)104330716
|0 (DE-576)209890088
|a Kollektive Sicherheit
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4461975-3
|0 (DE-627)230760716
|0 (DE-576)212626051
|a Information warfare
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4010452-7
|0 (DE-627)106357816
|0 (DE-576)208888128
|a Computerkriminalität
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4156741-9
|0 (DE-627)104609001
|0 (DE-576)209829168
|a Geopolitik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4056287-6
|0 (DE-627)104713607
|0 (DE-576)209117214
|a Spionage
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4149208-0
|0 (DE-627)105563013
|0 (DE-576)209770716
|a Destabilisierung
|2 gnd
|
651 |
|
7 |
|0 (DE-588)1135962553
|0 (DE-627)890988382
|0 (DE-576)490197698
|a Erde
|2 gnd
|
689 |
0 |
0 |
|d s
|0 (DE-588)1075612675
|0 (DE-627)833540866
|0 (DE-576)444407030
|a Cyberattacke
|2 gnd
|
689 |
0 |
1 |
|d s
|0 (DE-588)1118882725
|0 (DE-627)872358631
|0 (DE-576)479682461
|a Cyberterrorismus
|2 gnd
|
689 |
0 |
|
|5 (DE-627)
|
776 |
1 |
|
|z 9780674246010
|
787 |
0 |
8 |
|i Rezensiert in
|a Shaffer, Ryan, 1982 -
|t Drone activity and cyber terrorism
|d 2024
|w (DE-627)1895379997
|
856 |
4 |
2 |
|u https://www.gbv.de/dms/bowker/toc/9780674987555.pdf
|v 2020-10-18
|x Aggregator
|3 Inhaltsverzeichnis
|
936 |
r |
v |
|a MF 9500
|b Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)
|k Politologie
|k Politische Systeme: einzelne Elemente
|k Politische Sachgebiete
|k Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)
|0 (DE-627)1271205475
|0 (DE-625)rvk/122811:
|0 (DE-576)201205475
|
936 |
r |
v |
|a ST 277
|b Sonstiges zur Sicherheit in der Datenverarbeitung
|k Informatik
|k Monografien
|k Software und -entwicklung
|k Sonstiges zur Sicherheit in der Datenverarbeitung
|0 (DE-627)1271118971
|0 (DE-625)rvk/143643:
|0 (DE-576)201118971
|
936 |
b |
k |
|a 89.41
|j Staat und einzelne Gruppierungen
|q DA-3
|0 (DE-627)106417118
|
936 |
b |
k |
|a 89.42
|j Staat und Bürger
|q DA-3
|0 (DE-627)106418254
|
936 |
b |
k |
|a 71.43
|j Technologische Faktoren
|x Soziologie
|q DA-3
|0 (DE-627)106402919
|
936 |
b |
k |
|a 89.58
|j Politische Gewalt
|q DA-3
|0 (DE-627)106416960
|
936 |
f |
i |
|0 (DE-627)1756134707
|a RQ
|b Weltweit
|k Weltweit
|2 fivr
|
936 |
f |
i |
|0 (DE-627)1756136386
|a SI03.02
|b Informationstechnologie
|k Technik
|k Technikzweige
|k Informationstechnologie
|2 fivs
|
936 |
f |
i |
|0 (DE-627)1756135363
|a SC
|b Internationale Sicherheit/Verteidigung
|k Internationale Sicherheit/Verteidigung
|2 fivs
|
938 |
1 |
0 |
|0 (DE-627)1756180598
|0 (DE-615)6608724
|a Global
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756139288
|0 (DE-615)6604295
|a Cyberspace
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756170568
|0 (DE-615)6606610
|a Informations-/Kommunikationstechnologie
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756233098
|0 (DE-615)6601168
|a Internationale Sicherheit
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756194688
|0 (DE-615)6602727
|a Informationskriegführung
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)175613944X
|0 (DE-615)6604316
|a Hacken/Hacker
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756193525
|0 (DE-615)6608795
|a Computerkriminalität
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756206775
|0 (DE-615)6605033
|a Geopolitik
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756195137
|0 (DE-615)6609013
|a Spionage
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756187673
|0 (DE-615)6604461
|a Instabilität/Destabilisierung
|2 fivt
|
938 |
1 |
1 |
|0 (DE-627)1756235201
|0 (DE-615)6604688
|a Informationssicherheit
|2 fiva
|
938 |
1 |
1 |
|0 (DE-627)1756188831
|0 (DE-615)6607834
|a Kritische Infrastrukturen
|2 fiva
|
951 |
|
|
|a BO
|
ELC |
|
|
|b 1
|
ORI |
|
|
|a SA-MARC-krimdok_oa001.raw
|