img Leseprobe Leseprobe

Cyberwarfare

Threats to Critical Infrastructure

Kristan Stoddart

PDF
ca. 128,39
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Springer International Publishing img Link Publisher

Sozialwissenschaften, Recht, Wirtschaft / Strafrecht, Strafprozessrecht, Kriminologie

Beschreibung

This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members).


Weitere Titel von diesem Autor
Weitere Titel in dieser Kategorie
Cover Cybercrime
David S. Wall
Cover Improvised Munitions Handbook
U.S. Department of Defense

Kundenbewertungen

Schlagwörter

Iran, Cybersecurity defense, China, Behavioral psychology, Cyberwar, Russia, threats to critical infrastructure, cybersecurity, Risk management, Human Intelligence, Cybercrime, cyberespionage, hacking, technical attack methods, computer security, social engineering