000 | 03311nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-658-43879-1 | ||
003 | DE-He213 | ||
005 | 20240730172039.0 | ||
007 | cr nn 008mamaa | ||
008 | 240502s2024 gw | s |||| 0|eng d | ||
020 |
_a9783658438791 _9978-3-658-43879-1 |
||
024 | 7 |
_a10.1007/978-3-658-43879-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aKestner, Peter. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9101508 |
|
245 | 1 | 4 |
_aThe Art of Cyber Warfare _h[electronic resource] : _bStrategic and Tactical Approaches for Attack and Defense in the Digital Age / _cby Peter Kestner. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aWiesbaden : _bSpringer Fachmedien Wiesbaden : _bImprint: Springer, _c2024. |
|
300 |
_aXX, 292 p. 1 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction: 1984 and the lessons of the past -- Lessons from the past -- Modern and hybrid warfare -- The art of cyber warfare -- Outlook: The future of cyber warfare. | |
520 | _aThe Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources - but not the laws of physics - it is possible to learn from past actions and reactions. The author aims to demonstrate in this book that, in reality, we have only transferred old methods into our current era but have forgotten to translate their reasons, effects, and the resulting lessons. For, as it has been for thousands of years, the reasons for human-created conflicts remain the same: wealth, fame, power, honor, or desire. Can we learn something from history for present and future (cyber) wars? The author Peter Kestner is a security consultant with over 25 years of experience in the field of cybersecurity. He advises SMEs and DAX30 companies, as well as government and defense entities, on cybersecurity, cybercrime, and cyberterrorism. His focus has been on the security of databases, operating systems, hardware, networks, as well as cryptography and steganography. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer crimes. _910774 |
|
650 | 0 |
_aComputer security. _93970 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Crime. _986411 |
650 | 2 | 4 |
_aPrinciples and Models of Security. _978911 |
710 | 2 |
_aSpringerLink (Online service) _9101515 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783658438784 |
776 | 0 | 8 |
_iPrinted edition: _z9783658438807 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-658-43879-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87972 _d87972 |