The Art of Cyber Warfare (Record no. 87972)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03311nam a22005295i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-658-43879-1 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730172039.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240502s2024 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783658438791 |
-- | 978-3-658-43879-1 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Kestner, Peter. |
245 14 - TITLE STATEMENT | |
Title | The Art of Cyber Warfare |
Sub Title | Strategic and Tactical Approaches for Attack and Defense in the Digital Age / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XX, 292 p. 1 illus. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction: 1984 and the lessons of the past -- Lessons from the past -- Modern and hybrid warfare -- The art of cyber warfare -- Outlook: The future of cyber warfare. |
520 ## - SUMMARY, ETC. | |
Summary, etc | The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources - but not the laws of physics - it is possible to learn from past actions and reactions. The author aims to demonstrate in this book that, in reality, we have only transferred old methods into our current era but have forgotten to translate their reasons, effects, and the resulting lessons. For, as it has been for thousands of years, the reasons for human-created conflicts remain the same: wealth, fame, power, honor, or desire. Can we learn something from history for present and future (cyber) wars? The author Peter Kestner is a security consultant with over 25 years of experience in the field of cybersecurity. He advises SMEs and DAX30 companies, as well as government and defense entities, on cybersecurity, cybercrime, and cyberterrorism. His focus has been on the security of databases, operating systems, hardware, networks, as well as cryptography and steganography. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-658-43879-1 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Wiesbaden : |
-- | Springer Fachmedien Wiesbaden : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Crime. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Principles and Models of Security. |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.