000 03311nam a22005295i 4500
001 978-3-658-43879-1
003 DE-He213
005 20240730172039.0
007 cr nn 008mamaa
008 240502s2024 gw | s |||| 0|eng d
020 _a9783658438791
_9978-3-658-43879-1
024 7 _a10.1007/978-3-658-43879-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aKestner, Peter.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9101508
245 1 4 _aThe Art of Cyber Warfare
_h[electronic resource] :
_bStrategic and Tactical Approaches for Attack and Defense in the Digital Age /
_cby Peter Kestner.
250 _a1st ed. 2024.
264 1 _aWiesbaden :
_bSpringer Fachmedien Wiesbaden :
_bImprint: Springer,
_c2024.
300 _aXX, 292 p. 1 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction: 1984 and the lessons of the past -- Lessons from the past -- Modern and hybrid warfare -- The art of cyber warfare -- Outlook: The future of cyber warfare.
520 _aThe Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources - but not the laws of physics - it is possible to learn from past actions and reactions. The author aims to demonstrate in this book that, in reality, we have only transferred old methods into our current era but have forgotten to translate their reasons, effects, and the resulting lessons. For, as it has been for thousands of years, the reasons for human-created conflicts remain the same: wealth, fame, power, honor, or desire. Can we learn something from history for present and future (cyber) wars? The author Peter Kestner is a security consultant with over 25 years of experience in the field of cybersecurity. He advises SMEs and DAX30 companies, as well as government and defense entities, on cybersecurity, cybercrime, and cyberterrorism. His focus has been on the security of databases, operating systems, hardware, networks, as well as cryptography and steganography. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content.
650 0 _aData protection.
_97245
650 0 _aComputer crimes.
_910774
650 0 _aComputer security.
_93970
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Crime.
_986411
650 2 4 _aPrinciples and Models of Security.
_978911
710 2 _aSpringerLink (Online service)
_9101515
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783658438784
776 0 8 _iPrinted edition:
_z9783658438807
856 4 0 _uhttps://doi.org/10.1007/978-3-658-43879-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87972
_d87972