Cyber Warfare A Documentary and Reference Guide
Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is...
Saved in:
Main Author | |
---|---|
Format | eBook |
Language | English |
Published |
New York
Bloomsbury Publishing
2020
Bloomsbury Publishing USA Greenwood Press |
Edition | 1 |
Series | Documentary and Reference Guides |
Subjects | |
Online Access | Get full text |
ISBN | 1440872791 9781440872792 1440872783 9781440872785 |
Cover
Abstract | Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare. |
---|---|
AbstractList | Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation.This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare.The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare. Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation.This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare.The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare.Covers in detail one of the defining forms of conflict of the 21st century-cyber warfare will significantly impact virtually every American citizen over the next two decadesProvides more than 90 primary source documents and matching analysis, allowing readers to investigate the underpinnings of cyber warfareEnables readers to see the development of different concepts of cyber warfare through its chronological organizationReflects the deep knowledge of an editor who is a noted expert in cyber warfare and has taught for the United States Air Force for more than a decade |
Author | Paul J. Springer |
Author_xml | – sequence: 1 fullname: Springer, Paul J |
BookMark | eNqFz0lLxEAQBeAWF3TG_AMP3sRDoJf0UkcN4wIDXkSPoTpdrTgh0e6o-O8NZhA8eapX8PHgLdheP_S0wwqw4KQw3HKt9C5biKrizkoL4mB6hFbcWgP6kBU5v3DOpQQltThiRf3lKZ0-YoqY6JjtR-wyFdu7ZA9Xq_v6plzfXd_WF-sSZWWdLIU1wlLU3iEGiTGC0V4E8E63PLQesfUOgnIOjZwSV975EGXgQsdIqJbsfC7GvKHP_Dx0Y24-OvLDsMnNnzX_Wvc7Vk72bLavaXh7pzw2P6ylfkzYNavL2gg3NcMkT7aSUkdPQzPXVcIACFDf_c1f2w |
ContentType | eBook |
DBID | YSPEL |
DEWEY | 355.4 |
DatabaseName | Perlego |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Military & Naval Science |
EISBN | 9798216070535 1440872791 9781440872792 |
Edition | 1 |
ExternalDocumentID | 9798216070535 9781440872792 EBC6181609 4169919 |
Genre | Electronic books |
GroupedDBID | -VQ -VX 20A 38. AABBV ABARN ABMRC ABOVY ADVEM AERYV AHWGJ AJFER ALMA_UNASSIGNED_HOLDINGS AMUKE BBABE BBLSR CZZ DNNHO DUGUG EBSCA ECOWB EFU ESHEC EXS I4C JQR XI1 YSPEL ZBOWZ ACBYE |
ID | FETCH-LOGICAL-a24782-17617ef5b8aad2aff965b1d9b85c0dcbaacb89d388a62b8903b8bdf2d015ffea3 |
ISBN | 1440872791 9781440872792 1440872783 9781440872785 |
IngestDate | Fri Nov 08 04:06:23 EST 2024 Fri Nov 08 04:27:43 EST 2024 Wed Sep 10 04:16:36 EDT 2025 Wed Sep 03 00:00:51 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum_Ident | U167.5.C92$b.S675 2020 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a24782-17617ef5b8aad2aff965b1d9b85c0dcbaacb89d388a62b8903b8bdf2d015ffea3 |
OCLC | 1153077695 |
PQID | EBC6181609 |
PageCount | 1 online resource (376 pages) |
ParticipantIDs | askewsholts_vlebooks_9798216070535 askewsholts_vlebooks_9781440872792 proquest_ebookcentral_EBC6181609 perlego_books_4169919 |
PublicationCentury | 2000 |
PublicationDate | 2020 2020-07-31 2020-07-08 |
PublicationDateYYYYMMDD | 2020-01-01 2020-07-31 2020-07-08 |
PublicationDate_xml | – year: 2020 text: 2020 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationSeriesTitle | Documentary and Reference Guides |
PublicationYear | 2020 |
Publisher | Bloomsbury Publishing Bloomsbury Publishing USA Greenwood Press |
Publisher_xml | – name: Bloomsbury Publishing – name: Bloomsbury Publishing USA – name: Greenwood Press |
SSID | ssj0002293251 ssib055558334 ssib054458460 |
Score | 2.1787097 |
Snippet | Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through... |
SourceID | askewsholts proquest perlego |
SourceType | Aggregation Database Publisher |
SubjectTerms | Cyberspace Cyberspace operations (Military science) Cyberspace operations (Military science)-United States Information warfare |
Subtitle | A Documentary and Reference Guide |
TableOfContents | Document 43: Presidential Policy Directive 21-Critical Infrastructure Security and Resilience (2013) -- Document 44: Deterrence in the Age of Surprise (2014) -- Document 45: U.S. Charges Five Chinese Military Hackers for Cyber Espionage against U.S. Corporations and a Labor Organization for Commercial Advantage (2014) -- Document 46: Joint Publication 3-13: Information Operations (2014) -- Document 47: Executive Order 13687-Imposing Additional Sanctions with Respect to North Korea (2015) -- Document 48: Executive Order 13691-Promoting Private Sector Cybersecurity Information Sharing (2015) -- Document 49: Cyberwarfare and Cyberterrorism: In Brief (2015) -- Document 50: Department of Defense Law of War Manual (2015) -- Document 51: Presidential Policy Directive 41: United States Cyber Incident Coordination (2016) -- Document 52: Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2017) -- Document 53: Information Warfare: Issues for Congress (2018) -- Document 54: Cybersecurity: Selected Issues for the 115th Congress (2018) -- Document 55: Joint Publication 3-12: Cyberspace Operations (2018) -- Document 56: Developments in the Field of Information and Communications Technology in the Context of International Security (2018) -- Chapter 4. Non-U.S. Strategy and Documents -- Document 57: North Atlantic Treaty (1949) -- Document 58: Unrestricted Warfare (1999) -- Document 59: Tallinn Manual on the International Law Applicable to Cyber Warfare (2010) -- Document 60: A Strong Britain in an Age of Uncertainty: The National Security Strategy (2010) -- Document 61: Cyber Warfare (2010) -- Document 62: National Cyber Security Strategies: Setting the Course for National Efforts to Strengthen Security in Cyberspace (2012) -- Document 63: Cyberwarfare and International Humanitarian Law: The ICRC's Position (2013) Document 22: National Cyber Strategy of the United States (2018) -- Document 23: Summary, Department of Defense Cyber Strategy (2018) -- Chapter 2. U.S. Assessments of Cyber Adversaries -- Document 24: Military Power of the People's Republic of China (2009) -- Document 25: Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation (2009) -- Document 26: Mandiant APT1 Report: Exposing One of China's Cyber Espionage Units (2013) -- Document 27: Military and Security Developments Involving the Democratic People's Republic of Korea (2013) -- Document 28: China and International Law in Cyberspace (2014) -- Document 29: Military and Security Developments Involving the People's Republic of China (2014) -- Document 30: Cybersecurity Law of the People's Republic of China (2016) -- Document 31: Grizzly Steppe-Russian Malicious Cyber Activity (2016) -- Document 32: Assessing Russian Activities and Intentions in Recent U.S. Elections (2017) -- Document 33: Russia Military Power (2017) -- Document 34: Military and Security Developments Involving the Democratic People's Republic of Korea (2017) -- Document 35: China Military Power (2019) -- Chapter 3. U.S. Policies, Doctrine, and Reports -- Document 36: Presidential Decision Directive/NSC-63 (1998) -- Document 37: Cyber Threat Source Descriptions (2005) -- Document 38: The Comprehensive National Cybersecurity Initiative (2009) -- Document 39: Resilient Military Systems and the Advanced Cyber Threat (2013) -- Document 40: Executive Order 13636-Improving Critical Infrastructure Cybersecurity (2013) -- Document 41: Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented (2013) -- Document 42: National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience (2013) Document 82: James Clapper, Testimony before the U.S. Senate Committee on Armed Services (2015) -- Document 83: Glenn S. Gerstell, "Confronting the Cybersecurity Challenge" (2017) -- Document 84: Glenn S. Gerstell, "How We Need to Prepare for a Global Cyber Pandemic" (2018) -- Document 85: Glenn S. Gerstell, "Failing to Keep Pace with the Cyber Threat and Its Implications for Our Privacy Laws" (2018) -- Chronology -- Bibliography -- Index -- About the Author Cover -- Title Page -- Copyright -- Contents -- Reader's Guide to Related Documents -- Introduction -- Chapter 1. U.S. Cyber Strategy Documents -- Document 1: National Security Strategy of the United States (1987) -- Document 2: National Military Strategy of the United States of America: A Strategy of Flexible and Selective Engagement (1995) -- Document 3: National Military Strategy of the United States of America: Shape, Respond, and Prepare Now: A Military Strategy for a New Era (1997) -- Document 4: Quadrennial Defense Review (1997) -- Document 5: A National Security Strategy for a New Century (1999) -- Document 6: Quadrennial Defense Review Report (2001) -- Document 7: The National Strategy to Secure Cyberspace (2003) -- Document 8: The National Military Strategy of the United States of America: A Strategy for Today -- a Vision for Tomorrow (2004) -- Document 9: The National Defense Strategy of the United States of America (2005) -- Document 10: Quadrennial Defense Review Report (2006) -- Document 11: National Defense Strategy (2008) -- Document 12: National Security Strategy (2010) -- Document 13: Quadrennial Defense Review Report (2010) -- Document 14: The National Military Strategy of the United States of America: Redefining America's Military Leadership (2011) -- Document 15: International Strategy for Cyberspace (2011) -- Document 16: Quadrennial Defense Review (2014) -- Document 17: National Security Strategy (2015) -- Document 18: The National Military Strategy of the United States of America: The United States Military's Contribution to National Security (2015) -- Document 19: The Department of Defense Cyber Strategy (2015) -- Document 20: National Security Strategy of the United Statesof America (2017) -- Document 21: Summary of the 2018 National Defense Strategy of the United States of America (2018) Document 64: Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies (2013) -- Document 65: Wales Summit Declaration (2014) -- Document 66: National Security Strategy and Strategic Defence and Security Review 2015: A Secure and Prosperous United Kingdom (2015) -- Document 67: National Cyber Security Strategy 2016-2021 (2016) -- Document 68: People's Republic of China National Cyberspace Security Strategy (2016) -- Document 69: Developments in the Field of Information and Communications Technology in the Context of International Security (2018) -- Chapter 5. Speeches, Testimony, and Transcripts -- Document 70: President Barack Obama, "Remarks on Securing the Nation's Cyber Infrastructure" (2009) -- Document 71: William J. Lynn, III, "Remarks at the Defense Information Technology Acquisition Summit" (2009) -- Document 72: Hillary Clinton, "Remarks on Internet Freedom" (2010) -- Document 73: Statement for the Record of Seán P. McGurk before the U.S. Senate Homeland Security and Governmental Affairs Committee (2010) -- Document 74: Leon Panetta, "Remarks on Cybersecurity" (2012) -- Document 75: Robert S. Mueller, III, "Remarks before the RSA Cyber Security Conference" (2013) -- Document 76: Statement of General Keith B. Alexander before the Senate Committee on Armed Services (2013) -- Document 77: Keith Alexander, "Remarks at AFCEA International Cyber Symposium" (2013) -- Document 78: Michael Rogers, "Testimony before the U.S. House Intelligence Committee" (2014) -- Document 79: Barack Obama, "Remarks at the National Cybersecurity Communications Integration Center" (2015) -- Document 80: Advance Policy Questions for the Honorable Ashton Carter (2015) -- Document 81: Lisa O. Monaco, "Strengthening Our Nation's Cyber Defenses" (2015) |
Title | Cyber Warfare |
URI | https://www.perlego.com/book/4169919/cyber-warfare-a-documentary-and-reference-guide-pdf https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6181609 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781440872792 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9798216070535 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLbYeqGnDYpaYJOFEJcqVeI4iT1ph20qVJW204DeoufYQYypQ2k6qfz1e3acrBsgflwsN2kd6X2u_b2X9z4T8jZUaVFqiAOheRFwU7BA4bSwTRoqHplGS-_8Ip195PNFsrg_e89Vl9RqUvz4ZV3J_6CK1xBXWyX7D8h2g-IF7CO-2CLC2D4iv91HrymwUaYaf4aqhMoXl-NusXaJ4NXGFx22CrIf1l91B5_NBBzPJ-M2oOein77frDBW-Xh1_IfhHkQL0DW0kUjR4dsl8zzI8GicSfuaVyCdaY7QeaRCLTMpmBWjs3owO2Qny9DT7eHWOe2CI1bWB9lM9_dPrJRY7NXnrpzSDpLFJHLldf5Rcau61T66T_qw-obrO6799Qqdku-mujZfbn7aKt3-f7lHesYWheyTJ2b5jAzPnbR5taHv6AUgoNSvkM9J6JChHpkjekK3DEnRkLQzJHWGHJBP76eXZ7PAH0oRAONIp6yiZpSZMlECQDMoS5kmKtJSiaQIdaEACiWkjoWAlGEvjJVQumQaiVdZGohfkN3lzdIMCeUhsIwbHE4WHE0HCQOVZFJy6-mBGZE3W8bIb6_dC_RVvmUxyX7_pS3ERmTgDZk3d5GHo2cgR4S2Zs3d73xKcD49PUuR_KWhfPk3478iT-9n22uyW1drc4BsrVaHfpbcAfVrO4A |
linkProvider | ProQuest Ebooks |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cyber+Warfare%3A+A+Documentary+and+Reference+Guide&rft.au=Paul+J.+Springer%2C+Springer&rft.series=Documentary+and+Reference+Guides&rft.date=2020-07-08&rft.pub=Greenwood+Press&rft.isbn=9781440872785&rft.externalDocID=9798216070535 |
thumbnail_l | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.perlego.com%2Fbooks%2FRM_Books%2Fbloomsbury_us_jyhhlx%2F9781440872792.jpg |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97814408%2F9781440872792.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97982160%2F9798216070535.jpg |