Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
38911 Ergebnisse
Sortierung:
In: Indian defence review, Band 26, Heft 4, S. 79-84
ISSN: 0970-2512
This paper provides a synthetic description of the discontinuity between the evolution of warfare as it was in a pre-cyber era and the switch to cyber warfare. The evolution from bronze to iron weapons, and later to gunpower weapons and flying objects does not compare with the cyber era warfare, even UAV and "intelligent" rockets does not provide a significant understanding of the actual and near future scenarios. Cyber technology is nowadays pervasive and utilised world-wide. Global networking is one of the building blocks of our society, communication, information, government, health, education, mobility, markets, the list of involved sectors is endless, all of them rely on cyber security and the trustfulness of the information provided through the network. An even increasing volume of information is flowing through the network including messages concerning future risks or cyber-weapons. There is a clear need to adopt a renovated set of countermeasures to face and possibly cancel or mitigate such harms.
BASE
In: Marine corps gazette: the Marine Corps Association newsletter, Band 98, Heft 2, S. 44-47
ISSN: 0025-3170
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber intelligence expert Jeffrey Caruso explores the latest developments in cyber espionage and warfare, including the growing role of civilian hackers, the use of social media for nefarious purposes, and the targeting of nonmilitary infrastructure. Geopolitical cyber attacks increased by 440% between 2009 and 2018, demonstrating how this aspect of modern warfare will likely escalate in the future. Inside Cyber Warfare features an exclusive deep dive into the wartime operations of an offensive cyber unit of Ukraine's Ministry of Defense as it works to defend the nation against Russian forces, particularly since the 2022 invasion.
In: Hybrid and cyber war as consequences of the asymmetry: ac comprehensive approach answering hybrid actors and activities in cyberspace ; political, social and military responses, S. 119-126
In: Zeitschrift für öffentliches Recht: ZÖR = Austrian journal of public law, Band 73, Heft 1, S. 59-70
ISSN: 1613-7663
In: Global change, peace & security, Band 23, Heft 3, S. 437-438
ISSN: 1478-1166
In: Politique étrangère: PE ; revue trimestrielle publiée par l'Institut Français des Relations Internationales, Heft 3, S. 689-690
ISSN: 0032-342X
In: Vojnotehnicki glasnik, Band 60, Heft 2, S. 84-117
SSRN
China has the most extensive and most practised cyber-warfare capabilities in Asia. This article describes the development of these capabilities since the mid-1990s, the intelligence and military organisations involved, and the particular capabilities that have been demonstrated in defence exercises and in attacks on computer systems and networks in other countries. It notes that it is often very difficult to determine whether these attacks have originated with official agencies or private �Netizens?. It argues that China?s own computer systems and networks are replete with vulnerabilities, of which Chinese officials are well aware. It concludes that this appreciation of China?s deficiencies and vulnerabilities has led to the adoption of a pre-emptive strategy, as practiced in People?s Liberation Army exercises, in which China?s very destructive but relatively unsophisticated cyber-warfare capabilities are unleashed at the very outset of prospective conflicts.
BASE
China has the most extensive and most practised cyber-warfare capabilities in Asia. This article describes the development of these capabilities since the mid-1990s, the intelligence and military organisations involved, and the particular capabilities that have been demonstrated in defence exercises and in attacks on computer systems and networks in other countries. It notes that it is often very difficult to determine whether these attacks have originated with official agencies or private �Netizens?. It argues that China?s own computer systems and networks are replete with vulnerabilities, of which Chinese officials are well aware. It concludes that this appreciation of China?s deficiencies and vulnerabilities has led to the adoption of a pre-emptive strategy, as practiced in People?s Liberation Army exercises, in which China?s very destructive but relatively unsophisticated cyber-warfare capabilities are unleashed at the very outset of prospective conflicts.
BASE