Conquest in cyberspace: national security and information warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corr...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cambridge
Cambridge University Press
2007
|
Links: | https://doi.org/10.1017/CBO9780511804250 |
Zusammenfassung: | With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence. |
Umfang: | 1 Online-Ressource (xii, 323 Seiten) |
ISBN: | 9780511804250 |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-20-CTM-CR9780511804250 | ||
003 | UkCbUP | ||
005 | 20151005020622.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr|||||||||||| | ||
008 | 101021s2007||||enk o ||1 0|eng|d | ||
020 | |a 9780511804250 | ||
100 | 1 | |a Libicki, Martin C. | |
245 | 1 | 0 | |a Conquest in cyberspace |b national security and information warfare |c Martin C. Libicki |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2007 | |
300 | |a 1 Online-Ressource (xii, 323 Seiten) | ||
336 | |b txt | ||
337 | |b c | ||
338 | |b cr | ||
520 | |a With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence. | ||
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780521692144 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780521871600 |
966 | 4 | 0 | |l DE-91 |p ZDB-20-CTM |q TUM_PDA_CTM |u https://doi.org/10.1017/CBO9780511804250 |3 Volltext |
912 | |a ZDB-20-CTM | ||
912 | |a ZDB-20-CTM | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-20-CTM-CR9780511804250 |
---|---|
_version_ | 1825574052057579522 |
adam_text | |
any_adam_object | |
author | Libicki, Martin C. |
author_facet | Libicki, Martin C. |
author_role | |
author_sort | Libicki, Martin C. |
author_variant | m c l mc mcl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-20-CTM |
format | eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01706nam a2200253 i 4500</leader><controlfield tag="001">ZDB-20-CTM-CR9780511804250</controlfield><controlfield tag="003">UkCbUP</controlfield><controlfield tag="005">20151005020622.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr||||||||||||</controlfield><controlfield tag="008">101021s2007||||enk o ||1 0|eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511804250</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Conquest in cyberspace</subfield><subfield code="b">national security and information warfare</subfield><subfield code="c">Martin C. Libicki</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 323 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780521692144</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780521871600</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-20-CTM</subfield><subfield code="q">TUM_PDA_CTM</subfield><subfield code="u">https://doi.org/10.1017/CBO9780511804250</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CTM</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CTM</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-20-CTM-CR9780511804250 |
illustrated | Not Illustrated |
indexdate | 2025-03-03T11:58:06Z |
institution | BVB |
isbn | 9780511804250 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xii, 323 Seiten) |
psigel | ZDB-20-CTM TUM_PDA_CTM ZDB-20-CTM |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Libicki, Martin C. Conquest in cyberspace national security and information warfare Martin C. Libicki Cambridge Cambridge University Press 2007 1 Online-Ressource (xii, 323 Seiten) txt c cr With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence. Erscheint auch als Druck-Ausgabe 9780521692144 Erscheint auch als Druck-Ausgabe 9780521871600 |
spellingShingle | Libicki, Martin C. Conquest in cyberspace national security and information warfare |
title | Conquest in cyberspace national security and information warfare |
title_auth | Conquest in cyberspace national security and information warfare |
title_exact_search | Conquest in cyberspace national security and information warfare |
title_full | Conquest in cyberspace national security and information warfare Martin C. Libicki |
title_fullStr | Conquest in cyberspace national security and information warfare Martin C. Libicki |
title_full_unstemmed | Conquest in cyberspace national security and information warfare Martin C. Libicki |
title_short | Conquest in cyberspace |
title_sort | conquest in cyberspace national security and information warfare |
title_sub | national security and information warfare |
work_keys_str_mv | AT libickimartinc conquestincyberspacenationalsecurityandinformationwarfare |