Cyber blockades /
"Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or elec...
Saved in:
Online Access: |
Full text (MCPHS users only) |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Washington DC :
Georgetown University Press,
2014
|
Subjects: | |
Local Note: | ProQuest Ebook Central |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | in00000218579 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 141006t20142014dcu ob 001 0 eng d | ||
005 | 20240702204843.7 | ||
020 | |a 9781626161139 |q (electronic bk.) | ||
020 | |a 1626161135 |q (electronic bk.) | ||
020 | |z 9781626161115 |q (hardcover) | ||
020 | |z 1626161119 |q (hardcover) | ||
020 | |z 9781626161122 |q (paper) | ||
020 | |z 1626161127 |q (paper) | ||
024 | 8 | |a ebc1810129 | |
029 | 1 | |a AU@ |b 000056020481 | |
029 | 1 | |a DEBBG |b BV043029861 | |
029 | 1 | |a DEBBG |b BV044070695 | |
029 | 1 | |a DEBSZ |b 446488968 | |
029 | 1 | |a DEBSZ |b 472848704 | |
029 | 1 | |a GBVCP |b 1003789978 | |
035 | |a (OCoLC)892430303 | ||
035 | |a (OCoLC)ocn892430303 | ||
037 | |a 22573/ctt8d8djn |b JSTOR | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d EBLCP |d E7B |d YDXCP |d WAU |d OCLCQ |d P@U |d JSTOR |d OCLCQ |d DOS |d AGLDB |d IDEBK |d OCLCQ |d MOR |d CCO |d PIFAG |d ZCU |d MERUC |d OCLCQ |d OCLCA |d IOG |d U3W |d OCLCA |d BUF |d EZ9 |d JBG |d STF |d OCLCF |d OCLCO |d VNS |d OCLCQ |d VTS |d MUO |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d G3B |d LVT |d TKN |d DKC |d OCLCQ |d M8D |d OCLCQ |d MM9 |d INARC |d OCLCO |d OCL |d OCLCQ |d UKAHL |d OCLCO |d OCLCL |d SXB | ||
050 | 4 | |a HV6773.15.C97 |b R87 2014eb | |
072 | 7 | |a POL |x 040020 |2 bisacsh | |
072 | 7 | |a POL |x 011000 |2 bisacsh | |
072 | 7 | |a POL012000 |2 bisacsh | |
082 | 0 | 4 | |a 327.1/17 |2 23 |
100 | 1 | |a Russell, Alison Lawlor, |e author. | |
245 | 1 | 0 | |a Cyber blockades / |c Alison Lawlor Russell. |
264 | 1 | |a Washington DC : |b Georgetown University Press, |c [2014] | |
264 | 4 | |c ©2014 | |
300 | |a 1 online resource (xiv, 175 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Originally presented as the author's thesis (doctoral)--Fletcher School of Law and Diplomacy. | ||
504 | |a Includes bibliographical references (pages 155-165) and index. | ||
505 | 0 | |a List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on Estonia -- The Georgia-Russia War -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index. | |
520 | |a "Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of 'cyber blockades' and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare"--Provided by publisher | ||
588 | 0 | |a Print version record. | |
590 | |a ProQuest Ebook Central |b Ebook Central College Complete | ||
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
650 | 0 | |a Cyberspace |x Security measures. | |
650 | 0 | |a Computer security. | |
758 | |i has work: |a Cyber blockades (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGCCxcPhmP3QhHy8bCP8yb |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Russell, Alison Lawlor. |t Cyber blockades |z 9781626161115 |w (DLC) 2014011280 |w (OCoLC)880237668 |
852 | |b E-Collections |h ProQuest | ||
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/mcphs/detail.action?docID=1810129 |z Full text (MCPHS users only) |t 0 |
938 | |a Askews and Holts Library Services |b ASKH |n AH38242005 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1810129 | ||
938 | |a ebrary |b EBRY |n ebr10945252 | ||
938 | |a EBSCOhost |b EBSC |n 860030 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis29861890 | ||
938 | |a Internet Archive |b INAR |n cyberblockades0000russ | ||
938 | |a Project MUSE |b MUSE |n muse37564 | ||
938 | |a YBP Library Services |b YANK |n 12103499 | ||
947 | |a FLO |x pq-ebc-base | ||
999 | f | f | |s 21430aff-6831-484d-9064-b58c0c53d563 |i f58b7e09-a35a-4841-b6e0-16c15fc89bd4 |t 0 |
952 | f | f | |a Massachusetts College of Pharmacy and Health Sciences |b Online |c Online |d E-Collections |t 0 |e ProQuest |h Other scheme |
856 | 4 | 0 | |t 0 |u https://ebookcentral.proquest.com/lib/mcphs/detail.action?docID=1810129 |y Full text (MCPHS users only) |