Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

The virtual battlefield [electronic resource] : perspectives on cyber warfare / edited by Christian Czosseck and Kenneth Geers.

Contributor(s): Czosseck, Christian | Geers, Kenneth.
Material type: TextTextSeries: Cryptology and information security series: v. 3.Publisher: Amsterdam ; Washington, DC : Ios Press, c2009Description: 1 online resource (xx, 305 p.) : ill.ISBN: 9781607505112; 1607505118.Subject(s): Information warfare | Cyberterrorism | Computer crimes | HISTORY -- Military -- StrategyGenre/Form: Electronic books.Additional physical formats: Print version:: Virtual battlefield.DDC classification: 355.4 Online resources: EBSCOhost
Contents:
pt. 1. Strategic viewpoints. Cyber wars : a paradigm shift from means to ends / Amit Sharma -- Towards an evolving theory of cyberpower / Stuart H. Starr -- Sub rosa cyber war / Martin C. Libicki -- Warfare and the continuum of cyber risks : a policy perspective / Andrew Cutts -- Cyber terrorism : a new dimension in battlespace / J.P.I.A.G Charvat -- Borders in cyberspace : can sovereignty adapt to the challenges of cyber security? / Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. Rios -- Belarus in the context of European cyber security / Fyodor Pavlyuchenko -- Politically motivated denial of service attacks / Jose Nazario -- A brief examination of media coverage of cyberattacks (2007-present) / Cyrus Farivar.
pt. 2. Technical challenges and solutions. Behavioral analysis of zombie armies / Olivier Thonnard, Wim Mees, Marc Dacier -- Proactive botnet countermeasures-an offensive approach / Felix Leder, Tillmann Werner, Peter Martini -- When not to pull the plug-the need for network counter-surveillance operations / Scott Knight, Sylvain Leblanc -- Autonomic computer network defence using risk state and reinforcement learning / Luc Beaudoin, Nathalie Japkowicz, Stan Matwin -- Enhancing graph-based automated DoS attack response / Gabriel Klein ... [et al.] -- On nth order attacks / Daniel Bilar -- Business and social evaluation of denial of service attacks in view of scaling economic counter-measures / Louis-Francois Pau -- Virtual plots, real revolution / Roelof Temmingh, Kenneth Geers.
Review: "All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - and highlights the growing connection between computer security and national security"--Jacket.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and indexes.

pt. 1. Strategic viewpoints. Cyber wars : a paradigm shift from means to ends / Amit Sharma -- Towards an evolving theory of cyberpower / Stuart H. Starr -- Sub rosa cyber war / Martin C. Libicki -- Warfare and the continuum of cyber risks : a policy perspective / Andrew Cutts -- Cyber terrorism : a new dimension in battlespace / J.P.I.A.G Charvat -- Borders in cyberspace : can sovereignty adapt to the challenges of cyber security? / Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. Rios -- Belarus in the context of European cyber security / Fyodor Pavlyuchenko -- Politically motivated denial of service attacks / Jose Nazario -- A brief examination of media coverage of cyberattacks (2007-present) / Cyrus Farivar.

pt. 2. Technical challenges and solutions. Behavioral analysis of zombie armies / Olivier Thonnard, Wim Mees, Marc Dacier -- Proactive botnet countermeasures-an offensive approach / Felix Leder, Tillmann Werner, Peter Martini -- When not to pull the plug-the need for network counter-surveillance operations / Scott Knight, Sylvain Leblanc -- Autonomic computer network defence using risk state and reinforcement learning / Luc Beaudoin, Nathalie Japkowicz, Stan Matwin -- Enhancing graph-based automated DoS attack response / Gabriel Klein ... [et al.] -- On nth order attacks / Daniel Bilar -- Business and social evaluation of denial of service attacks in view of scaling economic counter-measures / Louis-Francois Pau -- Virtual plots, real revolution / Roelof Temmingh, Kenneth Geers.

"All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - and highlights the growing connection between computer security and national security"--Jacket.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

The virtual battlefield ©2009
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter